Blog > Page 12

Stay sharp with security insights

CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more
HowTo: Allow-List CyberHoot’s Domain Name and IP Addresses – Google Workspace

HowTo: Allow-List CyberHoot’s Domain Name and IP Addresses – Google Workspace

New CyberHoot businesses need to allow our training and phishing emails to reach their user's inboxes directly....

Read more
CyberHoot’s Email-Relay IP Addresses, Domains, and Allow-list Articles

CyberHoot’s Email-Relay IP Addresses, Domains, and Allow-list Articles

Updated: October 3rd, 2025 This article is a reference to CyberHoot's mail relay IP Addresses and Domain names. ...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

A newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...

Read more
Allow Listing CyberHoot in Sophos EndPoint Protection

Allow Listing CyberHoot in Sophos EndPoint Protection

When Phish testing environments where Sophos EDR is present, you will need to enable allow listing and add the...

Read more
HowTo: Enable Automatic Mode in CyberHoot’s Power Platform.

HowTo: Enable Automatic Mode in CyberHoot’s Power Platform.

CyberHoot Power Platform: Automatic Type Customers The instructions below provide a walkthrough on how to add a...

Read more
Allow-Listing in ProofPoint (aka: safe-listing, white-listing)

Allow-Listing in ProofPoint (aka: safe-listing, white-listing)

If you're using Proofpoint's spam filtering software, you can safelist (whitelist) CyberHoot to allow your users...

Read more
Bolstering HR Security Processes to Counter Fraudulent Worker Scams

Bolstering HR Security Processes to Counter Fraudulent Worker Scams

Recent reports have exposed sophisticated schemes where fraudulent technology workers, often using fake...

Read more
Malvertising Alert: Phishing Campaign Targets Onfido Users via Google Ads

Malvertising Alert: Phishing Campaign Targets Onfido Users via Google Ads

In April 2025, cybersecurity firm Push Security uncovered a sophisticated malvertising campaign targeting Onfido...

Read more
Autopilot Platform Administration Overview

Autopilot Platform Administration Overview

Welcome to the CyberHoot Autopilot Platform: A Guided Tour for New Administrators Starting with a new platform can...

Read more
Power Platform Administration Overview

Power Platform Administration Overview

Welcome to the CyberHoot Power Platform: A Guided Tour for New Administrators Starting with a new platform can...

Read more
CyberHoot Newsletter – April 2025

CyberHoot Newsletter – April 2025

Welcome to CyberHoot's April Newsletter! Spring may be in full bloom, but in the digital world, threat actors...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
Robyn Dunlap, Franklin Schools, Director of Technology
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director