Blog > Page 7

Stay sharp with security insights

Medusa Ransomware Deploys Malicious Driver to Evade Security

Medusa Ransomware Deploys Malicious Driver to Evade Security

As ransomware threats go, the Medusa ransomware group has a lengthy and notorious history of successfully...

Read more
You’ve Been Phished!

You’ve Been Phished!

But please don't panic.  This was only a test. Before landing here, you clicked on a phishing email sent by...

Read more
CyberHoot Newsletter – March 2025

CyberHoot Newsletter – March 2025

Welcome to CyberHoot's March Newsletter!As cyber threats continue to evolve, staying informed...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Polymorphic Extensions: A New Cyber Threat Impersonating Your Add-Ons

Polymorphic Extensions: A New Cyber Threat Impersonating Your Add-Ons

In a recent revelation, cybersecurity researchers from sqrx.com have uncovered a sophisticated attack method...

Read more
The Sophisticated Malware-as-a-Service Ecosystem of EncryptHub

The Sophisticated Malware-as-a-Service Ecosystem of EncryptHub

Dark Web Hacking Groups Mirror Real-World SaaS Companies In today's hyper connected world, the distinction...

Read more
HowTo: Add a New Client to CyberHoot’s Power Platform

HowTo: Add a New Client to CyberHoot’s Power Platform

This video was created specifically for MSPs with Super Admin access to CyberHoot's Power Platform and its...

Read more
HowTo: Reauthorize Entra ID – Client Secret

HowTo: Reauthorize Entra ID – Client Secret

The Entra ID sync is not functioning because the provided client secret has expired. To resolve this, you will...

Read more
Advisory: Critical Microsoft Outlook Vulnerability

Advisory: Critical Microsoft Outlook Vulnerability

Overview A Checkpoint security researcher has discovered a critical vulnerability in Microsoft Outlook that poses...

Read more
Hackers Exploit CAPTCHA Trick on Webflow to Deliver Phishing Attacks

Hackers Exploit CAPTCHA Trick on Webflow to Deliver Phishing Attacks

In today’s ever evolving cyber threat landscape, attackers are finding innovative ways to bypass traditional...

Read more
HowTo: Allow-List by X-Header in Exchange 2013, 2016, or Microsoft 365

HowTo: Allow-List by X-Header in Exchange 2013, 2016, or Microsoft 365

Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your...

Read more
CyberHoot Newsletter – February 2025

CyberHoot Newsletter – February 2025

Welcome to CyberHoot's February Newsletter!This month, we’re diving into some critical...

Read more
USPS Text Scam: Cybercriminals Hiding Malicious PDFs

USPS Text Scam: Cybercriminals Hiding Malicious PDFs

In the ever-evolving landscape of cybercrime, scammers are constantly finding innovative ways to...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst