Why Hoxhunt?
What makes us different
Why Hoxhunt
What makes Hoxhunt different and how we facilitate behavior change
Switch to Hoxhunt
Learn why others have ditched traditional SAT solutions for Hoxhunt
Security
See our certifications, badges, and security best practices
Products
Products
Security Behavior & Culture Change
Go beyond security awareness to effectively reduce human cyber-risk
Security Awareness Training
Reach your security awareness and compliance goals effortlessly
Phishing Training
Empower your employees with personalized phishing training
Security Operations
Manage threat response more effectively and with fewer resources
Experience Hoxhunt.
Request a demo today.
Book a demo
Customers
Pricing
Resources
Categories
Resource Hub
Home base for our content
Education
Articles about cybersecurity
Research
Original research and threat feed
Stories
Case studies, expert interviews, and industry-specific content
News
Company news, product news, press
Quick Links
Case Studies
Ebooks
Webinars
Glossary
Knowledge Base
Featured Resource
10 Steps to Award-Winning Cybersecurity Training: The AES CSO50 Playbook
Read case study
Company
company Links
About Hoxhunt
Discover our mission and meet the founders
Events
See our in-person and online events
Careers
Explore our open positions
Partners
Learn more about our partner program
Press Resources
Press kit and latest company news
Sign in
Request demo
Why Hoxhunt?
Why Hoxhunt
What makes Hoxhunt different and how we facilitate behavior change
Switch to Hoxhunt
Learn why others have ditched traditional SAT solutions for Hoxhunt
Security
See our certifications, badges, and security best practices
Products
Security Behavior & Culture Change
Go beyond security awareness to effectively reduce human cyber-risk
Security Awareness Training
Reach your security awareness and compliance goals effortlessly
Phishing Training
Empower your employees with personalized phishing training
Security Operations
Manage threat response more effectively and with fewer resources
Customers
Pricing
Resources
Categories
Resource Hub
Home base for our content
Education
Articles about cybersecurity
Research
Original research and threat feed
Stories
Case studies, expert interviews, and industry-specific content
News
Company news, product news, press
Quick Links
Case Studies
Ebooks
Webinars
Analyst Reports
Knowledge Base
Company
About Hoxhunt
Careers
Partners
Events
Press Resources
Sign in
Request a demo
Hoxhunt blog
Subscribe to our newsletter to get notified on the latest blog posts and more!
See all blog posts
Featured
February 1, 2024
Threat Intelligence Report: Adversary-in-the-Middle and other phishing trends
Siiri L.
Threat Analyst
Read the article
Latest articles
All
CISO Series
Cybersecurity
Interviews
Off the Hook – Threat Stories
Phishing
Product
Social Engineering
Threat Feed
New!
April 5, 2024
2 minutes
Threat feed week 14: IT and HR Impersonations, and more phishing attacks
March 29, 2024
2 minutes
Threat feed week 13: Starbucks, Microsoft, PayPal, Apple Pay, and more phishing attacks
March 8, 2024
Threat feed week 10: eBay, Microsoft, Disney+, and more phishing attacks
March 7, 2024
5 min
What is the difference between a security awareness and human risk manager?
March 1, 2024
Threat feed week 9: UPS, PostNord, Danske Bank, and more impersonations
February 29, 2024
A human cyber-risk report with hope, for a change
February 26, 2024
Maxime Cartier appointed Head of Human Risk Management
February 23, 2024
Threat feed week 8: National Bank of Greece, Posti, and S-Pankki impersonations
February 16, 2024
Threat feed week 7: Danske Bank, Tax phish, Die Post and Fed Ex impersonations
February 9, 2024
Threat feed week 6: Netflix, MetaMask, Geek Squad and other impersonations
February 6, 2024
“A Friendly Warning”: Phishing Emails Posing as Alerts
February 2, 2024
Threat feed week 5: Disney+, CXO, and HR impersonations, plus a fake invoice
October 20, 2021
13 min
Cybersecurity Awareness Month Webinar With Nixu and Aktia
October 7, 2021
14 min
Prof. Shoemaker: Integrating Cybersecurity & The C-Suite
September 20, 2021
10 min
Interview: Virtual CISO, Barak Engel, Part II
September 17, 2021
8 min
Barak Engel: From Virtual CISO to the Security Hippie
July 7, 2021
13 min
Key Takeaways: The Security Leader's Communication Playbook
June 7, 2021
7 min
CISO Evolution: From Business Blocker Nerd To Rockstar Enabler
March 9, 2021
5 min
Ten key takeaways from the Sandbox with CISO of IGT, Kevin DeLange
September 29, 2020
10 min
Interview with Henri Heinonen, CISO, Aktia
May 20, 2020
7 min
Interview with Christophe Rome, CISO at Lineas
January 20, 2023
Gartner names Hoxhunt a Security Behavior and Culture Program Representative Provider
April 4, 2022
6 min
Ten security awareness topics for your employees
December 28, 2022
Top 10 cybersecurity takeaways and trends in 2022
December 21, 2022
AI natural language processing and the future of phishing attacks and bypassing MFA, according to ChatGPT
November 16, 2022
Hoxhunt expert discusses ransomware and a landmark phishing study in Finland's top business publication
October 10, 2022
3 minutes
Report: SaaS permissions leave huge amounts of data exposed
September 28, 2022
4 minutes
Gone Phishin' Volume 6: Mid-to-late September, 2022
September 15, 2022
5 minutes
7 great cybersecurity awareness month ideas
September 14, 2022
5 minutes
Gone Phishin' Volume 5: early-to-mid September 2022
August 24, 2022
8 minutes
Gone Phishin': Volume 4 - Late August, 2022
August 10, 2022
5 minutes
Gone Phishin' Volume 3: Early August, 2022
April 12, 2024
11 minutes
Why You Need End User Security Training (Making the Business Case)
July 18, 2022
7 minutes
What is behavioural cybersecurity?
June 22, 2022
2 Minutes
Hoxhunt recognized by G2 as Summer 2022 Leader and Best Usability in Security Awareness Training
April 6, 2022
Biggest hidden risk in cybersec: missed phishing simulations
March 25, 2022
2 Minutes
Hoxhunt recognized by G2 as Spring 2022 Leader and Best Usability in Security Awareness Training. G2 reviewers vote us into top place overall for Satisfaction and Ease of Use.
March 17, 2022
Introducing the Hoxhunt Behavioral Cybersecurity Report
December 20, 2021
3 minutes
Log4j Log4shell vulnerability explained: Just when you thought it was safe to go on winter holiday
December 15, 2021
2 Minutes
Hoxhunt recognized as G2 Winter 2022 Leader in Security Awareness Training
December 21, 2021
9 minutes
Cybersecurity awareness training and cyber insurance: at the crossroads
November 29, 2021
2 Minutes
Change this one default setting in your Azure AD
October 1, 2021
9 min
Cybersecurity Month: TreeSolution's 5 tips on cybersecurity
September 7, 2021
4 min
ISO/IEC 27001 compliance and cybersecurity awareness training
September 3, 2021
3 min
Hoxhunt Recognized In The 2021 Gartner Market Guide (SACBT)
August 12, 2021
6 min
Why Business Email Compromise Attack Is The King Of Cybercrime
November 5, 2021
6 min
Protect a brand from cyber threats in the financial industry
June 22, 2021
8 min
Women in Cybersecurity: It’s time to get more diverse
December 24, 2022
10 minutes
#HoxhuntPhishmas Day 24: Advanced Credential Harvesting
April 11, 2024
Clone Phishing: Here's What You Need to Know To Protect Your Organization
October 20, 2022
8 minutes
What's the difference between spear-phishing and regular phishing?
October 14, 2022
8 minutes
Beware the fake invoice
October 6, 2022
6 minutes
What is a Threat Intelligence Feed?
October 5, 2022
5 minutes
You have a new (fake) voicemail
September 29, 2022
What to do when hackers pose as IT or tech support
September 23, 2022
6 minutes
How hackers prey on your insecurity
September 13, 2022
3 minutes
You've been mentioned! How hackers exploit curiosity
September 1, 2022
How to write an email that won’t be mistaken for spam or a phishing attack
August 23, 2022
8 minutes
New phishing technique shows alarming vulnerability
August 18, 2022
8 minutes
Uh oh! Do you owe? When invoices strike back
August 5, 2022
15 minutes
The good, the bad, and the ugly about browser fingerprinting
July 28, 2022
10 minutes
Have you seen these common pretexting techniques?
July 21, 2022
10 minutes
It's time to update your definition of phishing
July 14, 2022
5 minutes
This '90s internet throwback is the latest hacking trend
July 7, 2022
5 minutes
Get your hands off my (crypto) wallet!
June 30, 2022
5 minutes
How surveys and research inquiries can be harmful
June 10, 2022
Logo kits upgrade phishing attacks
May 25, 2022
Password protected attachments scam
May 19, 2022
3 minutes
BREAKING SCAM ALERT: The 2022 US Department of Transportation phishing attack is the greatest-in-a-bad-way credential harvesting scam we've seen this year
May 4, 2022
Pretexting is a simple and effective phishing attack without links
April 21, 2022
3 minutes
Three Steps and Five Effects of the Phishing Attack Kill Chain
April 12, 2022
Top five everyday-life phishing attacks in Spring 2022
March 21, 2022
The dangers of fax phishing
May 21, 2024
14 minutes
Whaling Phishing: The Definitive Defense Guide
May 8, 2024
9 minutes
Credential Harvesting: Ultimate Guide For Security Awareness Managers
May 6, 2024
9 minutes
Phishing Simulation Training: How it Works + Results
February 6, 2024
“A Friendly Warning”: Phishing Emails Posing as Alerts
March 15, 2023
ChatGPT vs. human phishing and social engineering study: Who's better?
March 10, 2022
7 min
What Is Phishing Training?
May 15, 2024
20 minutes
Phishing Training For Employees: Top 10 Threats You Need to Cover
October 24, 2022
7 minutes
How much does phishing really cost businesses?
October 12, 2022
5 minutes
Gone Phishin' Volume 7: Early to mid October, 2022
October 7, 2022
Infographic: Data breaches in the workplace
September 19, 2022
7 minutes
GTA 6 leaks and Uber hacked through social engineering
July 22, 2022
6 minutes
Gone Phishin' volume 2: late July 2022
July 7, 2022
5 minutes
Gone Phishing: Biweekly Media Roundup #1
June 30, 2022
5 minutes
Phishing services are surprisingly cheap
April 26, 2022
3 mins
Infographic: Make-or-Break Phishing Metrics
January 23, 2024
5 Minutes
What are the top 10 costs of phishing?
December 10, 2021
5 Minutes
What is the real cost of phishing in 2021?
August 27, 2021
5 min
What is A Spear-Phishing Attack and How Do You Recognize It?
August 12, 2021
5 min
5 Ways to Prevent Business Email Compromise Attacks
December 6, 2023
7 min
Gamification in security awareness training
May 14, 2024
Mitigate Credential Harvesting attacks with simulated email and login page templates
January 4, 2024
Hoxhunt Recognized as a Customers’ Choice vendor for 2023 Security Awareness Computer Based Training on Gartner Peer Insights™
September 13, 2023
2,000+ reviews and counting: Hoxhunt continues as G2 category leader in Fall 2023 reports
June 28, 2023
Track your human cyber-risk by calculating your security score
June 29, 2023
Are you minimizing your human cyber-risk? See how you compare to your industry peers
April 25, 2024
How to Influence Security Behaviors: Insights from "The Human Element" Webinar Series
June 9, 2020
5 min
What you should do to reduce human risk
May 29, 2020
5 min
How human error impacts human risk in cybersecurity?
May 20, 2020
5 min
5 ways attackers can bypass two-factor authentication
December 20, 2019
4 min
A Bug in G Suite Lets Attackers Spread Malware on Your Computer
April 5, 2024
2 minutes
Threat feed week 14: IT and HR Impersonations, and more phishing attacks
March 29, 2024
2 minutes
Threat feed week 13: Starbucks, Microsoft, PayPal, Apple Pay, and more phishing attacks
March 8, 2024
Threat feed week 10: eBay, Microsoft, Disney+, and more phishing attacks
March 1, 2024
Threat feed week 9: UPS, PostNord, Danske Bank, and more impersonations
February 23, 2024
Threat feed week 8: National Bank of Greece, Posti, and S-Pankki impersonations