CyberHoot Newsletter – March 2025

21st March 2025 | Blog, Newsletters CyberHoot Newsletter – March 2025


Welcome to CyberHoot’s March Newsletter!

As cyber threats continue to evolve, staying informed is the first line of defense. This month’s newsletter highlights critical security risks that could impact individuals and organizations alike. From a severe Microsoft Outlook vulnerability that allows attackers to bypass security to phishing scams leveraging CAPTCHA tricks and malicious PDFs, cybercriminals are finding new ways to exploit trusted platforms.

We also explore the U.S. Navy’s decision to restrict DeepSeek AI, shedding light on the growing concerns around AI security, misinformation, and adversarial manipulation.

Read on to learn about these pressing cybersecurity threats, how they work, and, most importantly, how you can protect yourself and your organization from potential attacks.

Cyber awareness is key—let’s stay ahead of the curve!




Advisory: Critical Microsoft Outlook Vulnerability

Critical Microsoft Outlook vulnerability allows attackers to bypass security using the ‘Moniker Link’ exploit.


Hackers Exploit CAPTCHA Trick on Webflow to Deliver Phishing Attacks

Cybercriminals are exploiting Webflow’s trusted infrastructure using fake CAPTCHA screens to deliver phishing attacks.


USPS Text Scam: Cybercriminals Hiding Malicious PDFs

Beware of a new USPS text scam using malicious PDF links to bypass security filters. Learn how cybercriminals exploit trusted platforms and how to protect yourself from phishing attacks.


U.S Navy Limits DeepSeek AI Over Cybersecurity Concerns

Discover why the U.S. Navy is restricting DeepSeek AI due to cybersecurity concerns, including data security risks, misinformation, and adversarial exploitation.

Customer Spotlight

Liking CyberHoot? We need your help. Please leave us a review using the links below!

TrustPilot.com | G2.com | Capterra.com | Google.com | TrustRadius.com | Gartner.com

-Gartner

For more information on how to leave a CyberHoot review, please watch the brief video overviews below.  Note: to avoid fraudulent reviews, each review website will require to you to create and validate your identity through an email account registration process.

CyberHoot Awarded Badges From G2

Cybrary Term of the Month

Attack Surface


The Attack Surface in cyber security is the sum of all of the points, or “attack vectors” where a hacker can try and input data into or take out data from an environment. Keeping the attack surface as small as possible is the best cyber security tactic.

Click here to read more!


Explore CyberHoot’s Extensive 950+ Term Cybersecurity Library

Recently Added Features

General Release Notes
  • Added bulk delete action to suppression list in Power platform.
  • Added bulk delete action to suppression list in Autopilot.
  • Added ability to clone archived training programs in Power platform.
  • Added admin interface to create and run HootPhish challenges from the Power platform.

  • Update Entra ID and Google sync interface in Autopilot to work with new manager syncing options. Updated managers interface to allow admins to switch primary manager assignment.

  • Added the ability to have multiple domains on a customer in Autopilot. Updated dark web monitoring to check additional domains.

  • Added compliance percentage badges to tables on customers dashboard.

  • Updated assignments to only get assigned on weekdays.
  • Added branding option in Power to mark logo as company name.
  • Added branding option in Autopilot to mark logo as company name.
  • Updated Cybersecurity Summary report to include Hoot Scores for user compliance and score for completed assignments.
  • Added alternative text to welcome email images.
  • Added custom messaging/whitelabeling to HootPhish challenge in Power platform.
  • Added HootPhish challenge messaging/whitelabeling to custom messaging Power-Up in Power-Up Platform.

CyberHoot CEO Craig Taylor Featured on The Cyber Insurance Imperative Podcast

Phishing training is everywhere—underwriters require it, businesses provide it, and employees often tune it out. But is it working?

In this episode, Craig Taylor, CEO of CyberHoot, sits down with host David Finz to explore a smarter, more effective approach to cybersecurity awareness—one that truly prepares teams to combat social engineering threats.


New Feature Alert: HootPhish Challenge

Set up a HootPhish Challenge to Test your Phishing Knowledge in a Fun Game

https://vimeo.com/1055741813/41c58fa2ce?share=copy

Enroll in CyberHoot’s Referral Program today and start earning a 20% share of all revenue generated for one year by those who register through your exclusive referral link. As a referral partner, not only will you receive financial rewards, but you’ll also experience the satisfaction of aiding others in becoming more security-conscious, safeguarding them against cyber threats. Don’t hesitate, sign up now at https://cyberhoot.com/referral-program/.

Referral through Autopilot’s Dashboard:

Join CyberHoot in our mission to create a more aware and better secured world! Recommend CyberHoot Autopilot to a friend, and they will enjoy a complimentary first month. For every new sign up who uses your referral link, you will receive a free month added to your account. This offer is exclusively for first-time CyberHoot registrants.

CyberHoot has Free Introductory Cyber Literacy Classes

Know someone who had a close call recently with a cyber attack, phishing email, or social engineering phone call?  Recommend CyberHoot’s free Cyber Literacy 101 training.  They’ll receive six (6) videos (each video is 3-4min.) and one of our positive reinforcement, hyper-realistic, phishing simulations. All for free. 

Registration: https://cyberhoot.com/individuals

CyberHoot’s Social Media

Join CyberHoot’s subreddit to stay updated in the world of cybersecurity!


Email based authentication for Training.

Instant Access

CyberHoot provides password-less access. End user frustration accessing training is gone. Click an email link for instant access!

Email Based Assignments

Automatic
Compliance

Employee reminders to manager escalations, CyberHoot delivers automated, hands-off, extremely high compliance.

Manager Escalations

Product Training

CyberHoot includes limitless product training for your IT Projects. Teach users how to use new software on their terms how they want to learn.

Micro Training

Cyber”Hoots” are 5 minutes or less ensuring your staff get trained quickly and effectively.

The Power of Open

CyberHoot is an open. Any video or PDF can train and govern your employees.

Effective

Many clients routinely achieve 90% or greater compliance to policies, training, and phish testing.

Secure your business with CyberHoot Today!!!


Sign Up Now

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more
CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more