Welcome to CyberHoot’s April Newsletter!
Spring may be in full bloom, but in the digital world, threat actors are flourishing with equal intensity.
This month, we’re diving into the Medusa Ransomware group’s latest evasion tactic—deploying a malicious kernel driver that can disable security tools and operate undetected. We review Polymorphic Extensions, a stealthy new threat that mimics legitimate browser add-ons with the ability to change its skin to look like common password managers (and steal your secret key!). Finally, we take a closer look at EncryptHub, a rising star in the Malware-as-a-Service ecosystem, offering professional-grade attack kits to cybercriminals around the globe.
As threats grow smarter and more accessible, staying informed is your first line of defense.
Liking CyberHoot? We need your help. Please leave us a review using the links below!
-Gartner
For more information on how to leave a CyberHoot review, please watch the brief video overviews below. Note: to avoid fraudulent reviews, each review website will require to you to create and validate your identity through an email account registration process.
A Malicious URL is a link created with the purpose of promoting scams, attacks, and fraud. By clicking on an infected URL, you may download malware or a trojan that can take control of your device, or you might be persuaded into providing personal information on a fake website such as your username and password. Malicious URLs are often seen embedded in phishing attacks, tricking users into clicking on the link(s). Hackers use techniques like “typosquatting” to make malicious URLs look legitimate. For example, the URL is r n icrosoft.com rather than microsoft.com can be used to trick users due to it looking legitimate at a glance.
Explore CyberHoot’s Extensive 950+ Term Cybersecurity Library
Set up a HootPhish Challenge to Test your Phishing Knowledge in a Fun Game
Enroll in CyberHoot’s Referral Program today and start earning a 20% share of all revenue generated for one year by those who register through your exclusive referral link. As a referral partner, not only will you receive financial rewards, but you’ll also experience the satisfaction of aiding others in becoming more security-conscious, safeguarding them against cyber threats. Don’t hesitate, sign up now at https://cyberhoot.com/referral-program/.
Join CyberHoot in our mission to create a more aware and better secured world! Recommend CyberHoot Autopilot to a friend, and they will enjoy a complimentary first month. For every new sign up who uses your referral link, you will receive a free month added to your account. This offer is exclusively for first-time CyberHoot registrants.
Know someone who had a close call recently with a cyber attack, phishing email, or social engineering phone call? Recommend CyberHoot’s free Cyber Literacy 101 training. They’ll receive six (6) videos (each video is 3-4min.) and one of our positive reinforcement, hyper-realistic, phishing simulations. All for free.
Registration: https://cyberhoot.com/individuals
Join CyberHoot’s subreddit to stay updated in the world of cybersecurity!
CyberHoot provides password-less access. End user frustration accessing training is gone. Click an email link for instant access!
Employee reminders to manager escalations, CyberHoot delivers automated, hands-off, extremely high compliance.
CyberHoot includes limitless product training for your IT Projects. Teach users how to use new software on their terms how they want to learn.
Cyber”Hoots” are 5 minutes or less ensuring your staff get trained quickly and effectively.
CyberHoot is an open. Any video or PDF can train and govern your employees.
Many clients routinely achieve 90% or greater compliance to policies, training, and phish testing.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.