Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected

CyberHoot

Visit CyberHoot

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

May 6, 2025

A new cyberattack campaign dubbed "Elusive Comet" is exploiting Zoom's remote control feature through social engineering to infiltrate the systems of cryptocurrency traders and venture capitalists, enabling malware deployment and data theft.

Bolstering HR Security Processes to Counter Fraudulent Worker Scams

May 1, 2025

Discover how HR teams can counter rising tech job scams by enhancing identity verification, interview processes, and ongoing employee monitoring to protect against fraudulent remote workers.

Malvertising Alert: Phishing Campaign Targets Onfido Users via Google Ads

April 22, 2025

Initial Access Brokers are changing tactics, selling low-cost access to more targets. Learn how this shift increases cyber risks and what defenses to implement.

Autopilot Platform Administration Overview

April 21, 2025

This blog post includes quick-start videos to help new users navigate CyberHoot’s Autopilot Platform, covering your dashboard, automation tools, training, phishing, dark web scans, and reporting insights.

Power Platform Administration Overview

April 21, 2025

This blog post includes quick-start videos to help new users navigate CyberHoot’s Power Platform, covering your dashboard, automation tools, policies, training, phishing, dark web scans, product modules, and reporting insights.

CyberHoot Newsletter – April 2025

April 16, 2025

This newsletter summarizes cybersecurity news from March, and boy there are some big events that happened.

HowTo: How to Add Users via M365 (Entra ID) on Power Platform

April 15, 2025

Learn how to quickly add users to your organization through Entra ID. This step-by-step guide simplifies user onboarding and helps you manage access securely.

Division of Labor in Criminal Enterprises leads to High-Volume, Low-Cost Attacks

April 15, 2025

Initial Access Brokers are changing tactics, selling low-cost access to more targets. Learn how this shift increases cyber risks and what defenses to implement.

Tax Season Scams: Microsoft Warns of Phishing Attacks

April 8, 2025

Protect yourself this tax season: Learn how hackers use tax-themed phishing emails to steal data and deploy malware.

Top 3 Microsoft Office Exploits Hackers Are Using in 2025—and How to Stop Them

April 1, 2025

Medusa ransomware is now using a malicious driver to bypass security tools and disable EDR systems. Learn how this advanced technique works and how to protect your organization.

Explore ChannelPro

Events

Reach Our Audience