CyberHoot
Malvertising Alert: Phishing Campaign Targets Onfido Users via Google Ads
Initial Access Brokers are changing tactics, selling low-cost access to more targets. Learn how this shift increases cyber risks and what defenses to implement.
Autopilot Platform Administration Overview
This blog post includes quick-start videos to help new users navigate CyberHoot’s Power Platform, covering your dashboard, automation tools, policies, training, phishing, dark web scans, product modules, and reporting insights.
Power Platform Administration Overview
This blog post includes quick-start videos to help new users navigate CyberHoot’s Power Platform, covering your dashboard, automation tools, policies, training, phishing, dark web scans, product modules, and reporting insights.
CyberHoot Newsletter – April 2025
This newsletter summarizes cybersecurity news from March, and boy there are some big events that happened.
HowTo: How to Add Users via M365 (Entra ID) on Power Platform
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
Division of Labor in Criminal Enterprises leads to High-Volume, Low-Cost Attacks
Initial Access Brokers are changing tactics, selling low-cost access to more targets. Learn how this shift increases cyber risks and what defenses to implement.
Tax Season Scams: Microsoft Warns of Phishing Attacks
Protect yourself this tax season: Learn how hackers use tax-themed phishing emails to steal data and deploy malware.
Top 3 Microsoft Office Exploits Hackers Are Using in 2025—and How to Stop Them
Medusa ransomware is now using a malicious driver to bypass security tools and disable EDR systems. Learn how this advanced technique works and how to protect your organization.
Medusa Ransomware Deploys Malicious Driver to Evade Security
Medusa ransomware is now using a malicious driver to bypass security tools and disable EDR systems. Learn how this advanced technique works and how to protect your organization.