CyberHoot
Cybersecurity Leader Uploads Sensitive Files to AI
A senior cybersecurity leader’s AI mistake shows why training employees to use public AI tools safely matters more than ever.
The post Cybersecurity Leader Uploads Sensitive Files to AI appeared first on CyberHoot.
Common Google Workspace Security Gaps
Discover the most common Google Workspace security gaps, why they cause breaches, and the practical steps you can take to close them.
The post Common Google Workspace Security Gaps appeared first on CyberHoot.
HowTo: PowerShell Script for Safe Links Configuration in M365
Microsoft Powershell scripts automate a more realistic and successful phish testing environment when set up correctly. This is one script that helps allow-list link protection.
The post HowTo: PowerShell Script for Safe Links Configuration in M365 appeared first on CyberHoot.
CyberHoot’s Cybersecurity Newsletter: Jan. 2026
CyberHoot's Newsletter, January 2026 version. Read up on CyberHoot's latest articles, updates, and testimonials from current customers!
The post CyberHoot’s Cybersecurity Newsletter: Jan. 2026 appeared first on CyberHoot.
MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)
MongoBleed exposed 87,000 internet-facing MongoDB databases. Learn who’s at risk, how to patch immediately, and how to secure your data.
The post MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours) appeared first on CyberHoot.
HowTo: Allow-List in Perception Point
This article explains how Autopilot’s CustomHoots PowerUp works and provides guidance on creating your own training with CustomHoots.
The post HowTo: Allow-List in Perception Point appeared first on CyberHoot.
QR Codes Are Back (They Still Want Your Password)
Protect your organization from QR code–based phishing attacks with 10 practical defenses & proven strategies to stop QR-enabled email threats.
The post QR Codes Are Back (They Still Want Your Password) appeared first on CyberHoot.
CyberHoot Treasure Map to Mastery and Success
Treasure Map to Success
The post CyberHoot Treasure Map to Mastery and Success appeared first on CyberHoot.
AI-Powered Phishing Kits Are Game-Changing, In a Very Bad Way
AI-powered phishing kits are making scams smarter and harder to spot. Learn how these new attacks work and what businesses can do to stay protected.
The post AI-Powered Phishing Kits Are Game-Changing, In a Very Bad Way appeared first on CyberHoot.
HowTo: Create Your Own Training with CustomHoots
This article explains how Autopilot’s CustomHoots PowerUp works and provides guidance on creating your own training with CustomHoots.
The post HowTo: Create Your Own Training with CustomHoots appeared first on CyberHoot.
