Read articles about security awareness, risk management, behavior change, and more
How quishing is being used in attacks, what these threats look like in the wild and best practices for avoiding them.
Your ultimate guide to the process behind social engineering training and all of the tips and know-how you need to ensure your training successfully changes behavior.
Gamified cyber security training is a scientifically proven method to boost user engagement and motivate them to change behavior and build cyber skills continuously.
Vishing attacks are spiking, and they’re powered by AI voice clones and social engineering. Here's how to prevent vishing with real-world tactics and simulation-based training.
Compare Hoxhunt vs. KnowBe4 with real user insights, reviews, and security team feedback. Find out how each platform drives real behavior change, reduces admin overhead, and builds a stronger security
A breakdown of the best security awareness training and compare top security awareness training vendors based on real reviews, not marketing claims.
At Hoxhunt, we’ve spent years redesigning what effective security awareness training should look like. Here's what we've found works.
Here's what real Hoxhunt customers say about the platform. A deep dive into simulations, reporting, quality of support and more.
The top KnowBe4 competitors to consider for security awareness and phishing training. Compare features, personalization, analytics, and more to make the right choice for your organization.
A complete overview of major standards and regulations that require awareness training. Identify the most common standards, regulations, and security frameworks that require SAT.
Every year around Halloween, security professionals gather around the campfire to tell spooky tales. This year, Barak Engel and Petri Kuivala join Hoxhunt to share some of their cyber horror stories.
Cyber security simulation training measurably changes employee behavior by testing them with realistic threats.
Hoxhunt had the privilege of attending the SANS Human Risk Summit in person on August 1-2. We've compiled a summary of the most impactful talks, highlighting key takeaways that are particularly releva
Why cyber insurance needs human risk management platforms and so do you
Your ultimate guide on how to prevent phishing. Everything you need to know to implement best practices and set up training that measurably reduces risk.
Your ultimate guide to spam vs phishing. What the differences are, how to recognize them and all of the practical measures you can take to keep your organization safe.
What is an SOC report? What are the different types of SOC reports available? How do you obtain one? Your questions answered.
We'll look into the behaviors to watch out for, how to assess risk and all the strategies you need to tangibly reduce human risk across your organization.
The Human Risk Manager controls the process of identifying, evaluating, and mitigating the cybersecurity risks associated with people.
Here's how to change the narrative around cybersecurity to get employees engaged.
How do you achieve cybersecurity behavior change? A breakdown of how science-based training transforms awareness into real-world risk reduction.
Learn how behavior-based cyber security training drives lasting employee behavior change. A breakdown of the key components, benefits, and why it’s essential for building a strong security culture.
Discover how Hoxhunt outperforms competitors in cybersecurity training. Based on real reviews, compare Hoxhunt's features, quality, and effectiveness to leading alternatives.
Empower your team to be a human firewall. Discover how training, vigilance, and smart habits protect against cyber threats.
Here's how integrating Yu-kai Chou's Octalysis Gamification and Behavioral Design Framework into cybersecurity training can dramatically improve user engagement and resilience.
Social media phishing campaigns use your publicly shared info against you in a spearphish attack, or get you to click on a fake social media notification
Learn what spear-phishing is, how it works, and how it's different from regular phishing. Recognizing spear-phishing attacks enables prevention!
The hit and run phishing attack plays on a specific anxiety. Read about this new widespread phishing attack and learn tips to stay off the hook!
Attackers target CEOs in BEC attack, the most lucrative phishing attack of all; learn 5 ways to prevent Business Email Compromise attacks.
Phishing and BEC attacks are still the kingpins of cybercrime despite the headline grabbing ransomware attacks of 2021. Learn how to prevent them.
Email verification malware phishing lets bad actors blast out malicious links en masse using tools that get more phish past email filters
We train our users to always hover over links in emails and to validate the domain where the links points to. This can’t be trusted if you are using Microsoft Edge to view your emails in Office 365.
From Spear-Phishing, to Credential Harvesting, To Possible Ad Fraud. Keep Reading To Find Out How This Story Unfolded and How You Can Avoid Getting Caught.
We're seeing an uptick in social engineers targeting social media accounts
Now that cookies are on their way out, a much sneakier way of identifying you is on its way in.
Years later, pop-ups are back, this time serving a different purpose... stealing your info.