Read articles about security awareness, risk management, behavior change, and more
How quishing is being used in attacks, what these threats look like in the wild and best practices for avoiding them.
Stop deepfake, smishing & vishing scams with 8 proven tactics: Feel→Slow→Verify→Act, no approvals in live calls, out-of-band callbacks, and a reporting culture.
Fantasy football can teach us how to learn stop worrying and love the art and chaos of starting a new leadership position.
Recent research published in the wall street was correct: bad phishing simulations produce bad results. So what now?
The CISO Fantasy Phish Bowl 2025 brings together some old friends and new joiners. There's one heavy absence: Shawn Bowen, to whom this year's Phish Bowl is dedicated. Here's to you, Shawn!
Phishing simulation best practices with real case results from Bird & Bird - ethical lures, instant feedback, and KPIs that drive reporting.
Best phishing simulation tools for enterprises (2025) - AI-powered, gamified platforms with multi-vector realism, SOC integrations, and risk dashboards.
The NIS 2 Compliance CISO / Executive Primer sets up the c-level for success
Discover the 10 steps to an award-winning cybersecurity training program by AES and Hoxhunt. Learn how they transformed their security awareness culture.
Kinsek and Hoxhunt Are Helping Australian Organisations Manage Their Human Risk and Foster a Security Culture To Empower People Towards Cyber Resilience.
In a world where data moves instantly and the news-cycle is minute to minute, it is sometimes hard to get a handle on the sheer number of cybercrimes that occur. Here's an infographic to help.
Phishing training provides employers with a solution to create awareness in their employees so they don't reveal sensitive information unintentionally. These sessions focus on improving an employee's response to phishing emails.
The Cybersecurity Awareness Year in Review 2021 covers unprecedented ransomware attacks and phishing costs, alongside record breaking cybersecurity investment
Frost & Sullivan spotlighted Hoxhunt for transforming human risk in cybersecurity. Their report shows a 225% increase in phishing reporting and 3X fewer clicks.
Why cyber insurance needs human risk management platforms and so do you
Your ultimate guide on how to prevent phishing. Everything you need to know to implement best practices and set up training that measurably reduces risk.
Your ultimate guide to spam vs phishing. What the differences are, how to recognize them and all of the practical measures you can take to keep your organization safe.
What is an SOC report? What are the different types of SOC reports available? How do you obtain one? Your questions answered.
We'll look into the behaviors to watch out for, how to assess risk and all the strategies you need to tangibly reduce human risk across your organization.
Repeat phishing offenders aren’t the problem... static training is. Learn how we use adaptive simulations to convert clickers into security assets.
Here's how to change the narrative around cybersecurity to get employees engaged.
How do you achieve cybersecurity behavior change? A breakdown of how science-based training transforms awareness into real-world risk reduction.
Learn how behavior-based cyber security training drives lasting employee behavior change. A breakdown of the key components, benefits, and why it’s essential for building a strong security culture.
Discover how Hoxhunt outperforms competitors in cybersecurity training. Based on real reviews, compare Hoxhunt's features, quality, and effectiveness to leading alternatives.
Empower your team to be a human firewall. Discover how training, vigilance, and smart habits protect against cyber threats.
The evolution of malware into today's most brutal phishing techniques has been guided by social engineering. Here's how and why.
Recruitment scams happen when a malicious actor claims to be a recruiting agent for a job that does not really exist
Loan scam emails prey on financial uncertainty and even pandemic desperation as businesses and individuals look for financial relief anywhere they can find it.
Copyright infringement phishing attacks can seem legit by burying threats of legal action inside a bunch of legalese citing legal statutes with financial penalties.
Cybercriminals are taking a page from the annals of rigged sports gambling, offering a little cash in return for a much bigger pay-off. This new phishing tactic plays on workforce disgruntlement to turn employees into insider threats with the exchange of bribes for complicity in a ransomware attack.
Open Redirects help attackers spoof legitimate brand URLs in their phishing attacks.
We train our users to always hover over links in emails and to validate the domain where the links points to. This can’t be trusted if you are using Microsoft Edge to view your emails in Office 365.
Your ultimate guide to the process behind social engineering training and all of the tips and know-how you need to ensure your training successfully changes behavior.
Vishing attacks are spiking, and they’re powered by AI voice clones and social engineering. Here's how to prevent vishing with real-world tactics and simulation-based training.
From Spear-Phishing, to Credential Harvesting, To Possible Ad Fraud. Keep Reading To Find Out How This Story Unfolded and How You Can Avoid Getting Caught.
We're seeing an uptick in social engineers targeting social media accounts
Now that cookies are on their way out, a much sneakier way of identifying you is on its way in.