Read articles about security awareness, risk management, behavior change, and more
How quishing is being used in attacks, what these threats look like in the wild and best practices for avoiding them.
#HoxhuntPhishmas Day 24: A real-world Credential Harvesting case explored and exposed!
We asked the AI bot ChatGPT about its dangers and designs on phishing and world domination. Its responses may surprise you.
The true cost of phishing and security breaches doesn’t just lie with the cost of the actual breach itself.
Your SaaS suite is leaving your backdoor open. Here's how to fix it.
In a world where data moves instantly and the news-cycle is minute to minute, it is sometimes hard to get a handle on the sheer number of cybercrimes that occur. Here's an infographic to help.
What could be more safe and secure than someone's voice? Actually, as it turns out, a lot of things.
Fantasy football can teach us how to learn stop worrying and love the art and chaos of starting a new leadership position.
Recent research published in the wall street was correct: bad phishing simulations produce bad results. So what now?
The CISO Fantasy Phish Bowl 2025 brings together some old friends and new joiners. There's one heavy absence: Shawn Bowen, to whom this year's Phish Bowl is dedicated. Here's to you, Shawn!
Phishing simulation best practices with real case results from Bird & Bird - ethical lures, instant feedback, and KPIs that drive reporting.
Best phishing simulation tools for enterprises (2025) - AI-powered, gamified platforms with multi-vector realism, SOC integrations, and risk dashboards.
Cybersecurity Awareness Month ideas that work: run a focused 10-day campaign, launch phishing simulations, boost MFA adoption, and use our 2025 toolkit.
Frost & Sullivan spotlighted Hoxhunt for transforming human risk in cybersecurity. Their report shows a 225% increase in phishing reporting and 3X fewer clicks.
Why cyber insurance needs human risk management platforms and so do you
Your ultimate guide on how to prevent phishing. Everything you need to know to implement best practices and set up training that measurably reduces risk.
Your ultimate guide to spam vs phishing. What the differences are, how to recognize them and all of the practical measures you can take to keep your organization safe.
What is an SOC report? What are the different types of SOC reports available? How do you obtain one? Your questions answered.
We'll look into the behaviors to watch out for, how to assess risk and all the strategies you need to tangibly reduce human risk across your organization.
Repeat phishing offenders aren’t the problem... static training is. Learn how we use adaptive simulations to convert clickers into security assets.
Here's how to change the narrative around cybersecurity to get employees engaged.
How do you achieve cybersecurity behavior change? A breakdown of how science-based training transforms awareness into real-world risk reduction.
Learn how behavior-based cyber security training drives lasting employee behavior change. A breakdown of the key components, benefits, and why it’s essential for building a strong security culture.
Discover how Hoxhunt outperforms competitors in cybersecurity training. Based on real reviews, compare Hoxhunt's features, quality, and effectiveness to leading alternatives.
Empower your team to be a human firewall. Discover how training, vigilance, and smart habits protect against cyber threats.
yB posing as an IT person via a text message or behind a computer, an attacker can gain physical access to your computer and compromise not just your computer but your entire company network.
Harvesting personally identifiable information (PII) is common practice for hackers and other malicious actors. Here's how they do it.
Curiosity is one of the most powerful human qualities that malicious actors can weaponise to increase the efficiency of their campaigns.
We often mistake real emails for malicious messages or phishing attacks, and disregard them accordingly. This translates to a loss of time and money
We came across a spear phishing campaign that was cleverly disguised as an internal communication. It resembled one of the many newsletters your inbox is probably packed with right now.
Ever received an unexpected invoice? It's a harrowing feeling. Here's how to check to make sure you're not being scammed.
We train our users to always hover over links in emails and to validate the domain where the links points to. This can’t be trusted if you are using Microsoft Edge to view your emails in Office 365.
Your ultimate guide to the process behind social engineering training and all of the tips and know-how you need to ensure your training successfully changes behavior.
Vishing attacks are spiking, and they’re powered by AI voice clones and social engineering. Here's how to prevent vishing with real-world tactics and simulation-based training.
From Spear-Phishing, to Credential Harvesting, To Possible Ad Fraud. Keep Reading To Find Out How This Story Unfolded and How You Can Avoid Getting Caught.
We're seeing an uptick in social engineers targeting social media accounts
Now that cookies are on their way out, a much sneakier way of identifying you is on its way in.
Years later, pop-ups are back, this time serving a different purpose... stealing your info.