Blog > Page 5

Stay sharp with security insights

CyberHoot Newsletter – March 2025

CyberHoot Newsletter – March 2025

Welcome to CyberHoot's March Newsletter!As cyber threats continue to evolve, staying informed...

Read more
Polymorphic Extensions: A New Cyber Threat Impersonating Your Add-Ons

Polymorphic Extensions: A New Cyber Threat Impersonating Your Add-Ons

In a recent revelation, cybersecurity researchers from sqrx.com have uncovered a sophisticated attack method...

Read more
HowTo: How to Archive Users via Azure Sync (Entra ID)

HowTo: How to Archive Users via Azure Sync (Entra ID)

Archiving users on CyberHoot's Power Platform via Azure AD Sync (using Graph API)If your company...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

The Sophisticated Malware-as-a-Service Ecosystem of EncryptHub

The Sophisticated Malware-as-a-Service Ecosystem of EncryptHub

Dark Web Hacking Groups Mirror Real-World SaaS Companies In today's hyper connected world, the distinction...

Read more
HowTo: How to Add Users via Google Workspace Sync

HowTo: How to Add Users via Google Workspace Sync

Adding users to CyberHoot's Power and Autopilot Platforms via Google Workspace SyncIf your...

Read more
HowTo: Add a New Client to CyberHoot’s Power Platform

HowTo: Add a New Client to CyberHoot’s Power Platform

This video was created specifically for MSPs with Super Admin access to CyberHoot's Power Platform and its...

Read more
HowTo: Reauthorize Entra ID – Client Secret

HowTo: Reauthorize Entra ID – Client Secret

The Entra ID sync is not functioning because the provided client secret has expired. To resolve this, you will...

Read more
Advisory: Critical Microsoft Outlook Vulnerability

Advisory: Critical Microsoft Outlook Vulnerability

Overview A Checkpoint security researcher has discovered a critical vulnerability in Microsoft Outlook that poses...

Read more
Hackers Exploit CAPTCHA Trick on Webflow to Deliver Phishing Attacks

Hackers Exploit CAPTCHA Trick on Webflow to Deliver Phishing Attacks

In today’s ever evolving cyber threat landscape, attackers are finding innovative ways to bypass traditional...

Read more
HowTo: Allow-List by X-Header in Exchange 2013, 2016, or Microsoft 365

HowTo: Allow-List by X-Header in Exchange 2013, 2016, or Microsoft 365

Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your mail...

Read more
CyberHoot Newsletter – February 2025

CyberHoot Newsletter – February 2025

Welcome to CyberHoot's February Newsletter!This month, we’re diving into some critical...

Read more
USPS Text Scam: Cybercriminals Hiding Malicious PDFs

USPS Text Scam: Cybercriminals Hiding Malicious PDFs

In the ever-evolving landscape of cybercrime, scammers are constantly finding innovative ways to...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering