Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

CyberHoot’s Email-Relay IP Addresses, Domains, and Allow-list Articles

CyberHoot’s Email-Relay IP Addresses, Domains, and Allow-list Articles

Updated: May 12th, 2026 This article is a reference to CyberHoot's mail relay IP Addresses and Domain names.  The...

Read more
Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

Your Employees Connected 47 Apps to Google Last Year. Can You Name One of Them?

OAuth tokens don't expire when employees leave, passwords change, or apps go rogue. Your security program needs...

Read more
Attackers Don’t Need a Key. They Already Have Yours.

Attackers Don’t Need a Key. They Already Have Yours.

Most breaches don't start with a hacker in a hoodie cracking code at 3am. They start with your username and a...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

CyberHoot’s Cybersecurity Newsletter: April 2026

CyberHoot’s Cybersecurity Newsletter: April 2026

This month we need to talk about something big. Not doomsday big, but pay-attention-now big. On April 7th,...

Read more
HowTo: Configure CyberHoot’s Report Phish Integration for Google Workspace

HowTo: Configure CyberHoot’s Report Phish Integration for Google Workspace

Google Workspace "Report Phish" Integration 🔹 Overview Gmail's built-in "Report Phishing" button...

Read more
Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Article Updates: As of May 6th 2026, every major U.S. AI lab, including Google DeepMind, Microsoft, xAI,...

Read more
AttackPhish – Browser Allowlisting Guide

AttackPhish – Browser Allowlisting Guide

If your mail filter and spam settings are already configured, this guide covers the one remaining step:...

Read more
When the “CEO” Calls and Asks You to Move Money Fast

When the “CEO” Calls and Asks You to Move Money Fast

A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...

Read more
When the Attack Looks Just Like You

When the Attack Looks Just Like You

Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...

Read more
CyberHoot’s Cybersecurity Newsletter: March 2026

CyberHoot’s Cybersecurity Newsletter: March 2026

Welcome to CyberHoot’s March Cybersecurity Newsletter! Cybercriminals continue to adapt their tactics,...

Read more
Critical Application

Critical Application

A Critical Application is any system whose compromise would cause significant business, financial, legal, or...

Read more
Data Availability

Data Availability

Data Availability refers to ensuring that data and systems are accessible to authorized users when needed,...

Read more
Testimonials

See who's talking about Cyberhoot

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory
Thanks to CyberHoot, we were able to offer our customers an engaging and effective awareness training program. Our first customer who saw it was impressed, which speaks volume
Oscar Nunez, DSI, IT Solutions Architect