"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
New CyberHoot businesses need to allow our training and phishing emails to reach their user's inboxes directly....
Read moreUpdated: May 8th, 2025 This article is a reference to CyberHoot's mail relay IP Addresses and Domain names. The...
Read moreA newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...
Read moreWhen Phish testing environments where Sophos EDR is present, you will need to enable allow listing and add the...
Read moreCyberHoot Power Platform: Automatic Type Customers The instructions below provide a walkthrough on how to add a...
Read moreIf you're using Proofpoint's spam filtering software, you can safelist (whitelist) CyberHoot to allow your users...
Read moreRecent reports have exposed sophisticated schemes where fraudulent technology workers, often using fake...
Read moreIn April 2025, cybersecurity firm Push Security uncovered a sophisticated malvertising campaign targeting Onfido...
Read moreWelcome to the CyberHoot Autopilot Platform: A Guided Tour for New Administrators Starting with a new platform can...
Read moreWelcome to the CyberHoot Power Platform: A Guided Tour for New Administrators Starting with a new platform can...
Read moreAdding users to CyberHoot's Power Platform via Azure AD/ Entra ID Sync (using Graph API) If your company uses...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.