Include:
Tech
Cybersecurity
Business Strategy
Channel Insights
Stay Connected

CyberHoot

Visit CyberHoot

CyberHoot Newsletter – March 2025

March 21, 2025

This newsletter summarizes cybersecurity news from March, and boy there are some big events that happened.

Polymorphic Extensions: A New Cyber Threat Impersonating Your Add-Ons

March 18, 2025

Discover how malicious browser extensions use polymorphic techniques to impersonate legitimate add-ons, posing serious cybersecurity risks.

HowTo: How to Archive Users via Azure Sync (Entra ID)

March 18, 2025

CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.

The Sophisticated Malware-as-a-Service Ecosystem of EncryptHub

March 11, 2025

EncryptHub malware is a sophisticated cyber threat enabling data theft, remote access, and system compromise.

HowTo: How to Add Users via Google Workspace Sync

March 5, 2025

CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.

HowTo: Add a New Client to CyberHoot’s Power Platform

March 5, 2025

Adding customers is easy with the 5 step wizard. This article goes into the basic details of adding your customers into CyberHoot.

HowTo: Reauthorize Entra ID – Client Secret

March 5, 2025

Microsoft GCC Azure Sync requires an Enterprise Application currently within CyberHoot. This article explains how to set this up.

Advisory: Critical Microsoft Outlook Vulnerability

February 25, 2025

Critical Microsoft Outlook vulnerability allows attackers to bypass security using the 'Moniker Link' exploit.

Hackers Exploit CAPTCHA Trick on Webflow to Deliver Phishing Attacks

February 18, 2025

Cybercriminals are exploiting Webflow’s trusted infrastructure using fake CAPTCHA screens to deliver phishing attacks.

HowTo: Allow-List by X-Header in Exchange 2013, 2016, or Microsoft 365

February 12, 2025

Allow-Listing X-Headers is necessary in order for CyberHoot to send simulated phishing emails to bypass your mail filter. We recommend whitelisting by IP address or hostname but depending on your ...

Explore ChannelPro

Events

Reach Our Audience