Blog > Page 7

Stay sharp with security insights

Division of Labor in Criminal Enterprises leads to High-Volume, Low-Cost Attacks

Division of Labor in Criminal Enterprises leads to High-Volume, Low-Cost Attacks

Henry Ford revolutionized automobile manufacturing a century ago by dividing complex assembly tasks into...

Read more
Tax Season Scams: Microsoft Warns of Phishing Attacks

Tax Season Scams: Microsoft Warns of Phishing Attacks

 As the April 15 U.S. Tax Day approaches, cybercriminals are intensifying their efforts to...

Read more
Top 3 Microsoft Office Exploits Hackers Are Using in 2025—and How to Stop Them

Top 3 Microsoft Office Exploits Hackers Are Using in 2025—and How to Stop Them

​In 2025, hackers continue to exploit office files, making them a top attack vector for cybercrime....

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Medusa Ransomware Deploys Malicious Driver to Evade Security

Medusa Ransomware Deploys Malicious Driver to Evade Security

As ransomware threats go, the Medusa ransomware group has a lengthy and notorious history of successfully...

Read more
You’ve Been Phished!

You’ve Been Phished!

But please don't panic.  This was only a test. Before landing here, you clicked on a phishing email sent by...

Read more
CyberHoot Newsletter – March 2025

CyberHoot Newsletter – March 2025

Welcome to CyberHoot's March Newsletter!As cyber threats continue to evolve, staying informed...

Read more
Polymorphic Extensions: A New Cyber Threat Impersonating Your Add-Ons

Polymorphic Extensions: A New Cyber Threat Impersonating Your Add-Ons

In a recent revelation, cybersecurity researchers from sqrx.com have uncovered a sophisticated attack method...

Read more
The Sophisticated Malware-as-a-Service Ecosystem of EncryptHub

The Sophisticated Malware-as-a-Service Ecosystem of EncryptHub

Dark Web Hacking Groups Mirror Real-World SaaS Companies In today's hyper connected world, the distinction...

Read more
HowTo: Add a New Client to CyberHoot’s Power Platform

HowTo: Add a New Client to CyberHoot’s Power Platform

This video was created specifically for MSPs with Super Admin access to CyberHoot's Power Platform and its...

Read more
HowTo: Reauthorize Entra ID – Client Secret

HowTo: Reauthorize Entra ID – Client Secret

The Entra ID sync is not functioning because the provided client secret has expired. To resolve this, you will...

Read more
Advisory: Critical Microsoft Outlook Vulnerability

Advisory: Critical Microsoft Outlook Vulnerability

Overview A Checkpoint security researcher has discovered a critical vulnerability in Microsoft Outlook that poses...

Read more
Hackers Exploit CAPTCHA Trick on Webflow to Deliver Phishing Attacks

Hackers Exploit CAPTCHA Trick on Webflow to Deliver Phishing Attacks

In today’s ever evolving cyber threat landscape, attackers are finding innovative ways to bypass traditional...

Read more
Testimonials

See who's talking about Cyberhoot

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory