CyberHoot Newsletter – August 2025

15th August 2025 | Newsletters CyberHoot Newsletter – August 2025

Welcome to CyberHoot’s August Newsletter!

This month, we’re tackling the latest cybersecurity threats that hit you where it matters most: your devices, your data, and your business.

We’re diving into Microsoft’s new Token Protection feature and how it’s preventing BEC attacks by stopping token theft in its tracks. We’ll also take a hard look at why MSPs are the new favorite target for cybercriminals and how we can fortify our defenses to fight back. Plus, we’re giving you the lowdown on SIM swapping attacks and showing you exactly how to protect your phone from becoming a hacker’s gateway.

Let’s jump in!


Got Questions? Let’s Talk.
If you’d like to dive deeper into anything we’ve covered—or talk cybersecurity strategy, compliance, or training—our CEO Craig Taylor is making time for one-on-one sessions with our subscribers.

It’s a rare chance to pick the brain of a seasoned cybersecurity leader. You can schedule a session directly below.


Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Discover how Microsoft’s new Token Protection feature helps prevent Business Email Compromise (BEC) by stopping token theft attacks.
Stay tuned for Part 2 on Tues. Aug. 19th, when we outline critical implementation measures to help ensure the highest probability of success during rollout.


Why Hackers Love MSPs and What We’re Gonna Do About It

MSPs are becoming cybercriminals’ favorite snack. Here’s why and how cybersecurity pros can fight back with smart, layered defenses.


Stop the Swap: How to Protect Yourself from SIM Swapping Attacks

Protect your phone from SIM swapping attacks. Learn how to lock your SIM, enable 2FA, and use your carrier tools to stop hackers.


Liking CyberHoot? We need your help. Please leave us a review using the links below!

TrustPilot.com | G2.com | Capterra.com | Google.com | TrustRadius.com | Gartner.com

TrustPilot

For more information on how to leave a CyberHoot review, please watch the brief video overviews below.  Note: to avoid fraudulent reviews, each review website will require to you to create and validate your identity through an email account registration process.



Business Email Compromise (BEC)

Business Email Compromise (BEC) is when an email account, often in a company’s finance department, is broken into and controlled by a hacker. This is often accomplished through a phishing attack that leads to credential theft as outlined in CyberHoot’s article titled the ‘Domino Attack’. Credentials are stolen when a victim clicks on a fraudulent phishing email link or opens a fake invoice. Doing this brings the victim to a malicious but believable website identical to the real vendor’s website, that prompts the user to enter their email and password. BEC attacks often come from someone your CFO already knows, meaning the sending email address is actually correct and expected. It usually turns out that the other finance person’s email has been compromised by hackers who are now targeting your financial officers. Thus the domino’s continue to fall company by company.

Click here to read more!


General Release Notes

  • Added note to users table and mass user updates pop-up in Autopilot that lets Admins know how to correctly restore synced users.
  • Updated pending assignment instruction messaging to correctly show customer messaging during simulations.
  • Improved email speed for Autopilot login.
  • Updated Autopilot login flow to store and remember browsers so admins will not have login each time they access. Added deployments page so multi-deployment admins can access all their deployments from one login.
  • Added CyberHoot Support chatbot.
  • Added date created column to users table.
  • Improved load speed in Autopilot’s deployment page.
  • New CustomHoots Power-Up!


CyberHoot’s new ChatBot Self-Service Support is now live, providing 24×7 assistance directly inside the Admin Interface and on our CyberHoot website. Located at the bottom right of your screen, this intelligent support tool helps you find answers instantly, troubleshoot issues, and access resources without waiting for a live agent. If you need additional help, you can always reach our live support team at support@cyberhoot.com.


Enroll in CyberHoot’s Referral Program today and start earning a 20% share of all revenue generated for one year by those who register through your exclusive referral link. As a referral partner, not only will you receive financial rewards, but you’ll also experience the satisfaction of aiding others in becoming more security-conscious, safeguarding them against cyber threats. Don’t hesitate, sign up now at https://cyberhoot.com/referral-program/.

Referral through Autopilot’s Dashboard:

Join CyberHoot in our mission to create a more aware and better secured world! Recommend CyberHoot Autopilot to a friend, and they will enjoy a complimentary first month. For every new sign up who uses your referral link, you will receive a free month added to your account. This offer is exclusively for first-time CyberHoot registrants.


Know someone who had a close call recently with a cyber attack, phishing email, or social engineering phone call?  Recommend CyberHoot’s free Cyber Literacy 101 training.  They’ll receive six (6) videos (each video is 3-4min.) and one of our positive reinforcement, hyper-realistic, phishing simulations. All for free.

Registration: https://cyberhoot.com/individuals


Secure your business with CyberHoot Today!!!

Latest Blogs

Stay sharp with the latest security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

Why Traditional Phishing Tests Fail — And How the Latest Research Proves It’s Time for a Change

For years, organizations have relied on fake email phishing simulations to measure employee resilience to...

Read more
Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Stopping Token Theft: How Microsoft’s Protections Prevent BEC Attacks

Welcome to our two-part blog series on Microsoft’s new email security enhancement now included in Office 365 P1...

Read more
Why Hackers Love MSPs and What We’re Gonna Do About It

Why Hackers Love MSPs and What We’re Gonna Do About It

"Being an MSP today is like wearing a neon sign that says, ‘Hack me! I’m the gateway to 100...

Read more