Blog > Page 3

Stay sharp with security insights

HowTo: The Benefits of CyberHoot’s HootPhish

HowTo: The Benefits of CyberHoot’s HootPhish

The Challenges of Traditional Phish Testing Traditional attack-based phishing tests have often felt punitive to...

Read more
HowTo: Adding Super Admins on Power Platform

HowTo: Adding Super Admins on Power Platform

Super Admins on Power/Partner Platform:Super administrators on the Power/Partner platform...

Read more
CyberHoot’s API Documentation

CyberHoot’s API Documentation

Overview CyberHoot's API allows for the following information to be pulled from the platform: Customers...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

HowTo: Add Managers to Employees in Microsoft Azure / Entra ID

HowTo: Add Managers to Employees in Microsoft Azure / Entra ID

Defining managers for each employee in CyberHoot is very important.  Employee managers are Carbon Copied...

Read more
HowTo: Enable Multifactor Authentication within CyberHoot

HowTo: Enable Multifactor Authentication within CyberHoot

The Importance of Multi-Factor Authentication (MFA) into Cloud/SaaS Applications: CyberHoot recommends clients...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more
CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more
HowTo: Allow-List CyberHoot’s Domain Name and IP Addresses – Google Workspace

HowTo: Allow-List CyberHoot’s Domain Name and IP Addresses – Google Workspace

New CyberHoot businesses need to allow our training and phishing emails to reach their user's inboxes directly....

Read more
CyberHoot’s Email-Relay IP Addresses, Domains, and Allow-list Articles

CyberHoot’s Email-Relay IP Addresses, Domains, and Allow-list Articles

Updated: May 8th, 2025This article is a reference to CyberHoot's mail relay IP Addresses and Domain names.  The...

Read more
Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

A newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...

Read more
Allow Listing CyberHoot in Sophos EndPoint Protection

Allow Listing CyberHoot in Sophos EndPoint Protection

When Phish testing environments where Sophos EDR is present, you will need to enable allow listing and add the...

Read more
HowTo: Enable Automatic Mode in CyberHoot’s Power Platform.

HowTo: Enable Automatic Mode in CyberHoot’s Power Platform.

CyberHoot Power Platform: Automatic Type Customers The instructions below provide a walkthrough on how to add a...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory