Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Malicious Chrome Extension Disguised as  a Business Tools

Malicious Chrome Extension Disguised as a Business Tools

If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...

Read more
CyberHoot’s Cybersecurity Newsletter: Feb. 2026

CyberHoot’s Cybersecurity Newsletter: Feb. 2026

Welcome to CyberHoot’s February Cybersecurity Newsletter! Attackers aren’t just targeting passwords...

Read more
Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Cybersecurity Leader Uploads Sensitive Files to AI

Cybersecurity Leader Uploads Sensitive Files to AI

Not surprising when Trouble Ensues Last summer, the interim head of a major U.S. cybersecurity agency uploaded...

Read more
Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more
HowTo: PowerShell Script for Safe Links Configuration in M365

HowTo: PowerShell Script for Safe Links Configuration in M365

PowerShell Script for Safe Links Configuration in Microsoft 365 Overview This PowerShell script configures...

Read more
CyberHoot’s Cybersecurity Newsletter: Jan. 2026

CyberHoot’s Cybersecurity Newsletter: Jan. 2026

Welcome to CyberHoot’s January Cybersecurity Newsletter! Bad guys are building and using better tools. What...

Read more
MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...

Read more
HowTo: Allow-List in Perception Point

HowTo: Allow-List in Perception Point

CyberHoot – Perception Point Allowlisting Instructions Organizations using Perception Point for...

Read more
QR Codes Are Back (They Still Want Your Password)

QR Codes Are Back (They Still Want Your Password)

Remember 2020? We scanned QR codes for everything. Restaurant menus. Parking meters. That awkward moment at a...

Read more
CyberHoot Treasure Map to Mastery and Success

CyberHoot Treasure Map to Mastery and Success

Welcome to Your CyberHoot Mastery Guide! You made it! This is your visual treasure map to CyberHoot success....

Read more
AI-Powered Phishing Kits Are Game-Changing, In a Very Bad Way

AI-Powered Phishing Kits Are Game-Changing, In a Very Bad Way

Phishing emails used to be easy to spot. Bad grammar. Weird links. Obvious scams. Those days are...

Read more
Testimonials

See who's talking about Cyberhoot

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer