If you’re using Proofpoint’s spam filtering software, you can safelist (whitelist) CyberHoot to allow your users to receive our simulated attack-based phish testing emails.
CyberHoot Mail Relays to Add to your Allow-Lists
Please Note: if you are using URL Defense in your ProofPoint, be sure to also enable a bypass for CyberHoot in URL defenses. See below for details.
The below instructions apply to allow-listing in ProofPoint Essentials.
NOTE: We also recommend that you add CyberHoot’s sending mail relay IP addresses to Proofpoint’s URL Defense (this will help prevent any issues with ProofPoint’s Targeted Attack Protection). Here are instructions on adding Portal’s IP addresses to ProofPoint’s Targeted Attack Protection:
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...
Read more
If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...
Read more
Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
