Read articles about security awareness, risk management, behavior change, and more
How quishing is being used in attacks, what these threats look like in the wild and best practices for avoiding them.
Learn what credential harvesting is, how to detect phishing attacks, and protect your organization from credential theft.
Wondering which attack simulation training is best for your team? Get a full breakdown of Hoxhunt vs. Microsoft Defender to make an informed decision.
In the guide below we'll break down exactly what you need to know about MFA fatigue, how to spot attacks as well as the latest security practices for protecting your organization.
Maxime Cartier recaps the webinar series, "The Human Element: The Science Behind Influencing Security Behaviors" and key learnings of the intricacies of human behavior in reducing cybersecurity risk.
Everything you need to know about end user security training. Why its necessary, what training looks like and how to quantify cyber risks.
Your essential guide to clone phishing. Real-world examples, prevention tactics, and actionable strategies to safeguard your organization.
Fantasy football can teach us how to learn stop worrying and love the art and chaos of starting a new leadership position.
Recent research published in the wall street was correct: bad phishing simulations produce bad results. So what now?
The CISO Fantasy Phish Bowl 2025 brings together some old friends and new joiners. There's one heavy absence: Shawn Bowen, to whom this year's Phish Bowl is dedicated. Here's to you, Shawn!
Phishing simulation best practices with real case results from Bird & Bird - ethical lures, instant feedback, and KPIs that drive reporting.
Best phishing simulation tools for enterprises (2025) - AI-powered, gamified platforms with multi-vector realism, SOC integrations, and risk dashboards.
Cybersecurity Awareness Month ideas that work: run a focused 10-day campaign, launch phishing simulations, boost MFA adoption, and use our 2025 toolkit.
Frost & Sullivan spotlighted Hoxhunt for transforming human risk in cybersecurity. Their report shows a 225% increase in phishing reporting and 3X fewer clicks.
Why cyber insurance needs human risk management platforms and so do you
Your ultimate guide on how to prevent phishing. Everything you need to know to implement best practices and set up training that measurably reduces risk.
Your ultimate guide to spam vs phishing. What the differences are, how to recognize them and all of the practical measures you can take to keep your organization safe.
What is an SOC report? What are the different types of SOC reports available? How do you obtain one? Your questions answered.
We'll look into the behaviors to watch out for, how to assess risk and all the strategies you need to tangibly reduce human risk across your organization.
Infrequent phishing tests are still popular for measuring an organization's resiliency. Are they good enough or do you need to step up your training game?
Without practice, people won’t know what to do with a dangerous email. Through continuous training, you can reinforce the right behavior in cybersecurity.
Today, cybersecurity awareness training for your employees should be just as important as defense technology. Learn how to train your employees better.
"Unusual activity in your account": Cybercriminals are taking advantage of your relationship with trusted companies by sending clone phishing emails that warn you of potential phishing scams.
Hoxhunt's Cybersecurity Glossary is here to help you navigate the terminology around phishing and cybersecurity.
#HoxhuntPhishmas Day 24: A real-world Credential Harvesting case explored and exposed!
We asked the AI bot ChatGPT about its dangers and designs on phishing and world domination. Its responses may surprise you.
The true cost of phishing and security breaches doesn’t just lie with the cost of the actual breach itself.
What could be more safe and secure than someone's voice? Actually, as it turns out, a lot of things.
Your SaaS suite is leaving your backdoor open. Here's how to fix it.
Log4J Log4Shell vulnerability explained to help you understand what it is and how to stay protected
A security vulnerability was recently reported in the default guest permissions of Microsoft Azure Active Directory. Here’s how to fix it and stay safe from attackers.
This phishing email was sent from outside the organization but is replacing the Caution! External Sender banner with a safe sender banner.
Apple just recently confirmed the most significant vulnerability in iOS history after ZecOps made a public announcement about their discovery of a security flaw.
According to security researchers, the iOS mail app, which is the email client that can be found on most Apple iPhones and iPads, has a severe security flaw making it vulnerable to attacks.
Stop deepfake, smishing & vishing scams with 8 proven tactics: Feel→Slow→Verify→Act, no approvals in live calls, out-of-band callbacks, and a reporting culture.
Your ultimate guide to the process behind social engineering training and all of the tips and know-how you need to ensure your training successfully changes behavior.
Vishing attacks are spiking, and they’re powered by AI voice clones and social engineering. Here's how to prevent vishing with real-world tactics and simulation-based training.
From Spear-Phishing, to Credential Harvesting, To Possible Ad Fraud. Keep Reading To Find Out How This Story Unfolded and How You Can Avoid Getting Caught.
We're seeing an uptick in social engineers targeting social media accounts
Now that cookies are on their way out, a much sneakier way of identifying you is on its way in.