CyberHoot
Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature
A new cyberattack campaign dubbed "Elusive Comet" is exploiting Zoom's remote control feature through social engineering to infiltrate the systems of cryptocurrency traders and venture capitalists, enabling malware deployment and data theft.
Bolstering HR Security Processes to Counter Fraudulent Worker Scams
Discover how HR teams can counter rising tech job scams by enhancing identity verification, interview processes, and ongoing employee monitoring to protect against fraudulent remote workers.
Malvertising Alert: Phishing Campaign Targets Onfido Users via Google Ads
Initial Access Brokers are changing tactics, selling low-cost access to more targets. Learn how this shift increases cyber risks and what defenses to implement.
Autopilot Platform Administration Overview
This blog post includes quick-start videos to help new users navigate CyberHoot’s Autopilot Platform, covering your dashboard, automation tools, training, phishing, dark web scans, and reporting insights.
Power Platform Administration Overview
This blog post includes quick-start videos to help new users navigate CyberHoot’s Power Platform, covering your dashboard, automation tools, policies, training, phishing, dark web scans, product modules, and reporting insights.
CyberHoot Newsletter – April 2025
This newsletter summarizes cybersecurity news from March, and boy there are some big events that happened.
HowTo: How to Add Users via M365 (Entra ID) on Power Platform
Learn how to quickly add users to your organization through Entra ID. This step-by-step guide simplifies user onboarding and helps you manage access securely.
Division of Labor in Criminal Enterprises leads to High-Volume, Low-Cost Attacks
Initial Access Brokers are changing tactics, selling low-cost access to more targets. Learn how this shift increases cyber risks and what defenses to implement.
Tax Season Scams: Microsoft Warns of Phishing Attacks
Protect yourself this tax season: Learn how hackers use tax-themed phishing emails to steal data and deploy malware.
Top 3 Microsoft Office Exploits Hackers Are Using in 2025—and How to Stop Them
Medusa ransomware is now using a malicious driver to bypass security tools and disable EDR systems. Learn how this advanced technique works and how to protect your organization.