Why Hoxhunt?
What makes us different
Why Hoxhunt
What makes Hoxhunt different and how we facilitate behavior change
Switch to Hoxhunt
Learn why others have ditched traditional SAT solutions for Hoxhunt
Security
See our certifications, badges, and security best practices
Products
Products
Security Behavior & Culture Change
Go beyond security awareness to effectively reduce human cyber-risk
Security Awareness Training
Reach your security awareness and compliance goals effortlessly
Phishing Training
Empower your employees with personalized phishing training
Security Operations
Manage threat response more effectively and with fewer resources
Experience Hoxhunt.
Request a demo today.
Book a demo
Customers
Pricing
Resources
Categories
Resource Hub
Home base for our content
Education
Articles about cybersecurity
Research
Original research and threat feed
Stories
Case studies, expert interviews, and industry-specific content
News
Company news, product news, press
Quick Links
Case Studies
Ebooks
Webinars
Glossary
Knowledge Base
Featured Resource
10 Steps to Award-Winning Cybersecurity Training: The AES CSO50 Playbook
Read case study
Company
company Links
About Hoxhunt
Discover our mission and meet the founders
Events
See our in-person and online events
Careers
Explore our open positions
Partners
Learn more about our partner program
Press Resources
Press kit and latest company news
Sign in
Request demo
Why Hoxhunt?
Why Hoxhunt
What makes Hoxhunt different and how we facilitate behavior change
Switch to Hoxhunt
Learn why others have ditched traditional SAT solutions for Hoxhunt
Security
See our certifications, badges, and security best practices
Products
Security Behavior & Culture Change
Go beyond security awareness to effectively reduce human cyber-risk
Security Awareness Training
Reach your security awareness and compliance goals effortlessly
Phishing Training
Empower your employees with personalized phishing training
Security Operations
Manage threat response more effectively and with fewer resources
Customers
Pricing
Resources
Categories
Resource Hub
Home base for our content
Education
Articles about cybersecurity
Research
Original research and threat feed
Stories
Case studies, expert interviews, and industry-specific content
News
Company news, product news, press
Quick Links
Case Studies
Ebooks
Webinars
Analyst Reports
Knowledge Base
Company
About Hoxhunt
Careers
Partners
Events
Press Resources
Sign in
Request a demo
Hoxhunt blog
Subscribe to our newsletter to get notified on the latest blog posts and more!
See all blog posts
Featured
February 1, 2024
Threat Intelligence Report: Adversary-in-the-Middle and other phishing trends
Siiri L.
Threat Analyst
Read the article
Latest articles
All
CISO Series
Cybersecurity
Interviews
Off the Hook – Threat Stories
Phishing
Product
Social Engineering
Threat Feed
New!
May 15, 2024
20 minutes
Phishing Training For Employees: Top 10 Threats You Need to Cover
May 14, 2024
Mitigate Credential Harvesting attacks with simulated email and login page templates
May 13, 2024
13 minutes
Essential Email Security Best Practices: Security Awareness Manager's Playbook (2024)
May 8, 2024
9 minutes
Credential Harvesting: Ultimate Guide For Security Awareness Managers
May 6, 2024
9 minutes
Phishing Simulation Training: How it Works + Results
May 2, 2024
10 minutes
How to Build a Human Firewall (Essential Guide)
April 29, 2024
10 minutes
MFA Fatigue Attacks: Ultimate Prevention Guide
April 25, 2024
How to Influence Security Behaviors: Insights from "The Human Element" Webinar Series
April 18, 2024
8 minutes
Creating a Company Culture for Security: 6 Step Actionable Strategy
April 12, 2024
11 minutes
Why You Need End User Security Training (Making the Business Case)
April 11, 2024
Clone Phishing: Here's What You Need to Know To Protect Your Organization
April 5, 2024
2 minutes
Threat feed week 14: IT and HR Impersonations, and more phishing attacks
July 4, 2023
Ira Winkler: "Cancel phishing training? Good luck with that!"
March 2, 2023
Lisa Kubicki from DocuSign on changing behavior with the Hoxhunt Human Risk Management Platform
May 11, 2022
A real approach to implementing machine learning to security awareness, by Ira Winkler
May 5, 2022
Radical Reporting author, Sara James discusses cybersecurity communication: Video and Q&A
April 27, 2022
CISO Executive Primer with Bill Bonney, Gary Hayslip, and Matt Stamper
April 1, 2022
Key takeaways from CISO Sandbox with Lisa Kubicki, DocuSign
March 10, 2022
George Finney joins the CISO Sandbox: Video and key takeaways
February 3, 2022
CISO Sandbox with Dan Lohrmann: Video and key takeaways
November 17, 2021
11 min
Mastering Cybersecurity Risk Management, with David X Martin
October 28, 2021
6 min
Key Takeaways From Hoxhunt Webinar with Dr. Rebecca Wynn
May 13, 2024
13 minutes
Essential Email Security Best Practices: Security Awareness Manager's Playbook (2024)
April 29, 2024
10 minutes
MFA Fatigue Attacks: Ultimate Prevention Guide
April 18, 2024
8 minutes
Creating a Company Culture for Security: 6 Step Actionable Strategy
March 7, 2024
5 min
What is the difference between a security awareness and human risk manager?
February 29, 2024
A human cyber-risk report with hope, for a change
February 26, 2024
Maxime Cartier appointed Head of Human Risk Management
February 1, 2024
Threat Intelligence Report: Adversary-in-the-Middle and other phishing trends
February 1, 2024
Why Gareth Thomas created a social media style security awareness training program for Lloyds Bank Group
January 31, 2024
Top cybersecurity trends of 2024 with complementary Gartner report download: Security Behavior and Culture Programs (SBCP)
January 28, 2024
NIS 2 Checklist: Compliance Basics for the CxO and Board of Directors
January 25, 2024
NIS2 Compliance: The CISO / Executive Primer
January 29, 2024
Reach every employee to reduce human cyber-risk
January 9, 2024
Security Culture Eats Human Risk for Breakfast
November 16, 2023
2 minutes
Hoxhunt cracks 2023 Deloitte Fast 50
October 23, 2023
1 minute
Hoxhunt Available Through GuidePoint Security as Demand for Security Behavior Change Accelerates
August 29, 2023
Hoxhunt Bolsters Partnership Strategy to Bring Leading Cybersecurity Behavior Change Technology to the UK
August 10, 2023
AES wins CSO50 award for transformative security behavior change with Hoxhunt
July 31, 2023
Lacking cybersecurity budget? How human risk reduction is the cybersecurity metric that transformed my budget.
July 20, 2023
2 minutes
Hoxhunt Human Risk Report on Critical Infrastructure: Key takeaways
July 19, 2023
Human Cyber-Risk Report: Critical Infrastructure
May 22, 2023
Vulnerability reported and fixed: Arbitrary file execution in Foxit PDF clients
May 11, 2023
Awareness training isn’t enough to protect your business—security behavior change is your missing key
May 4, 2023
Vulnerability reported and fixed: Attachment filetype denylist bypass in Foxit PDF clients
March 31, 2023
G2 awards Hoxhunt 14 Spring 2023 badges
February 7, 2023
7 min
How security behavior change lets you measure and manage True Risk
November 7, 2023
10 steps to award-winning cybersecurity training: The AES CSO50 Playbook
May 31, 2022
The winding road to Hoxhunt’s $40 million Series B funding round leads to the moon, with Mika Aalto, Hoxhunt co-Founder and CEO
December 24, 2022
10 minutes
#HoxhuntPhishmas Day 24: Advanced Credential Harvesting
April 11, 2024
Clone Phishing: Here's What You Need to Know To Protect Your Organization
October 20, 2022
8 minutes
What's the difference between spear-phishing and regular phishing?
October 14, 2022
8 minutes
Beware the fake invoice
October 6, 2022
6 minutes
What is a Threat Intelligence Feed?
October 5, 2022
5 minutes
You have a new (fake) voicemail
September 29, 2022
What to do when hackers pose as IT or tech support
September 23, 2022
6 minutes
How hackers prey on your insecurity
September 13, 2022
3 minutes
You've been mentioned! How hackers exploit curiosity
September 1, 2022
How to write an email that won’t be mistaken for spam or a phishing attack
August 23, 2022
8 minutes
New phishing technique shows alarming vulnerability
August 18, 2022
8 minutes
Uh oh! Do you owe? When invoices strike back
August 5, 2022
15 minutes
The good, the bad, and the ugly about browser fingerprinting
July 28, 2022
10 minutes
Have you seen these common pretexting techniques?
July 21, 2022
10 minutes
It's time to update your definition of phishing
July 14, 2022
5 minutes
This '90s internet throwback is the latest hacking trend
July 7, 2022
5 minutes
Get your hands off my (crypto) wallet!
June 30, 2022
5 minutes
How surveys and research inquiries can be harmful
June 10, 2022
Logo kits upgrade phishing attacks
May 25, 2022
Password protected attachments scam
May 19, 2022
3 minutes
BREAKING SCAM ALERT: The 2022 US Department of Transportation phishing attack is the greatest-in-a-bad-way credential harvesting scam we've seen this year
May 4, 2022
Pretexting is a simple and effective phishing attack without links
April 21, 2022
3 minutes
Three Steps and Five Effects of the Phishing Attack Kill Chain
April 12, 2022
Top five everyday-life phishing attacks in Spring 2022
March 21, 2022
The dangers of fax phishing
March 1, 2021
7 min
Cybersecurity in a hybrid work environment
February 8, 2021
7 min
A guide to effective phishing training
December 10, 2020
2 min
Two major phishing attacks hitting several enterprises
August 31, 2020
5 min
Phishing simulation best practices: how to communicate the value of phishing simulations to your employees
July 23, 2020
6 min
How to get leadership support to invest in a phishing training program
May 27, 2020
6 min
Why 20% of GitLab’s Employees Failed the Phishing Test
April 14, 2020
7 min
The CISO’s Russian Roulette: Not Training Remote Employees
April 2, 2020
6 min
Five COVID-19 Threats & How to Prepare For Them
January 9, 2020
9 min
Phishing Attacks and Scams in 2019 and Beyond
September 17, 2019
4 min
Attachments in Phishing 102
August 23, 2019
3 min
Attachments in Phishing 101
July 9, 2019
12 min
Just how much of a threat is Business Email Compromise?
June 27, 2019
11 min
Phishing 101: How Phishing Attacks and Scam Emails Work
June 27, 2019
10 min
Social Engineering—What Is it and How to Prepare For it?
March 28, 2019
11 min
How to Recognize and Avoid Phishing Attacks
February 19, 2019
8 min
How OSINT is Used Against Your Employees
January 31, 2019
3 min
Security Awareness Training Doesn't Work - Here's How to Fix it
January 10, 2019
4 min
What is spear-phishing and how do you recognize it?
December 20, 2018
3 min
5 Phishing Statistics for 2019 (with Infographic)
April 13, 2017
6 min
Hello world.
May 14, 2024
Mitigate Credential Harvesting attacks with simulated email and login page templates
January 4, 2024
Hoxhunt Recognized as a Customers’ Choice vendor for 2023 Security Awareness Computer Based Training on Gartner Peer Insights™
September 13, 2023
2,000+ reviews and counting: Hoxhunt continues as G2 category leader in Fall 2023 reports
June 28, 2023
Track your human cyber-risk by calculating your security score
June 29, 2023
Are you minimizing your human cyber-risk? See how you compare to your industry peers
April 25, 2024
How to Influence Security Behaviors: Insights from "The Human Element" Webinar Series
June 9, 2020
5 min
What you should do to reduce human risk
May 29, 2020
5 min
How human error impacts human risk in cybersecurity?
May 20, 2020
5 min
5 ways attackers can bypass two-factor authentication
December 20, 2019
4 min
A Bug in G Suite Lets Attackers Spread Malware on Your Computer
December 8, 2023
Threat feed week 49: eBay, Microsoft, SAP, McAfee, QuickBooks, and telecom impersonations
December 1, 2023
Threat feed week 48: Netflix, DocuSign, Microsoft Planner, QuickBooks, McAfee, Polygon, Avalanche, Danske Bank, plus other postal, banking, and crypto phishes
November 24, 2023
Threat feed week 47: Black Friday, cash awards, donations, and impersonations, including Adobe, the US Treasury Department, Meta Support, Facebook Ads, Microsoft, and more
November 17, 2023
Threat feed week 46: Microsoft, QuickBooks, Outlook, Chase Bank impersonations, QR codes, and crypto phishing emails
November 10, 2023
Threat feed week 45: Facebook, Google Forms, Verizon, Zoom, McAfee, Sharebox, Outlook, QuickBooks, HR, law firms, and telecommunications impersonations