Why Hoxhunt?
What makes us different
Why Hoxhunt
What makes Hoxhunt different and how we facilitate behavior change
Switch to Hoxhunt
Learn why others have ditched traditional SAT solutions for Hoxhunt
Security
See our certifications, badges, and security best practices
Products
solutions overview
Change
Equip employees with the skills to stop breaches before they happen
Comply
Reach security compliance automatically with just a few clicks.
Respond
Manage threat response more effectively and with fewer resources
products
Phishing Training
Security Awareness Training
Benchmark Phishing Simulation
Incident Response Orchestration
Automated Phishing Analysis with Instant Feedback
Phishing and Human Risk Dashboard
Want to learn more about Hoxhunt?
Request a demo
Customers
Pricing
Resources
Categories
Resource Hub
Home base for our content
Education
Articles about cybersecurity
Research
Original research and threat feed
Stories
Case studies, expert interviews, and industry-specific content
News
Company news, product news, press
Quick Links
Case Studies
Ebooks
Webinars
Glossary
Knowledge Base
Featured Resource
10 Steps to Award-Winning Cybersecurity Training: The AES CSO50 Playbook
Read case study
Company
company Links
About Hoxhunt
Discover our mission and meet the founders
Events
See our in-person and online events
Careers
Explore our open positions
Partners
Learn more about our partner program
Press Resources
Press kit and latest company news
Sign in
Request demo
Why Hoxhunt?
Why Hoxhunt
What makes Hoxhunt different and how we facilitate behavior change
Switch to Hoxhunt
Learn why others have ditched traditional SAT solutions for Hoxhunt
Security
See our certifications, badges, and security best practices
Products
solutions overview
Change
Equip employees with the skills to stop breaches before they happen
Comply
Reach security compliance automatically with just a few clicks
Respond
Manage threat response more effectively and with fewer resources
Products
Phishing Training
Security Awareness Training
Benchmark Phishing Simulation
Incident Response Orchestration
Automated Phishing Analysis with Instant Feedback
Phishing and Human Risk Dashboard
Customers
Pricing
Resources
Categories
Resource Hub
Home base for our content
Education
Articles about cybersecurity
Research
Original research and threat feed
Stories
Case studies, expert interviews, and industry-specific content
News
Company news, product news, press
Quick Links
Case Studies
Ebooks
Webinars
Analyst Reports
Knowledge Base
Company
About Hoxhunt
Careers
Partners
Events
Press Resources
Sign in
Request a demo
Hoxhunt blog
Subscribe to our newsletter to get notified on the latest blog posts and more!
See all blog posts
Featured
February 1, 2024
Threat Intelligence Report: Adversary-in-the-Middle and other phishing trends
Siiri L.
Threat Analyst
Read the article
Latest articles
All
CISO Series
Cybersecurity
Interviews
Off the Hook – Threat Stories
Phishing
Product
Social Engineering
Threat Feed
New!
February 9, 2024
Threat feed week 6: Netflix, MetaMask, Geek Squad and other impersonations
February 6, 2024
“A Friendly Warning”: Phishing Emails Posing as Alerts
February 2, 2024
Threat feed week 5: Disney+, CXO, and HR impersonations, plus a fake invoice
February 1, 2024
Why Gareth Thomas created a social media style security awareness training program for Lloyds Bank Group
February 1, 2024
Threat Intelligence Report: Adversary-in-the-Middle and other phishing trends
January 31, 2024
Top cybersecurity trends of 2024 with complementary Gartner report download: Security Behavior and Culture Programs (SBCP)
January 29, 2024
Reach every employee to reduce human cyber-risk
January 28, 2024
NIS 2 Checklist: Compliance Basics for the CxO and Board of Directors
January 26, 2024
Threat feed week 4: Adobe Acrobat, Microsoft, Outlook impersonations, and local credential harvesters
January 25, 2024
NIS2 Compliance: The CISO / Executive Primer
January 23, 2024
5 Minutes
What are the top 10 costs of phishing?
January 23, 2024
Cybersecurity glossary: phishing edition
July 4, 2023
Ira Winkler: "Cancel phishing training? Good luck with that!"
March 2, 2023
Lisa Kubicki from DocuSign on changing behavior with the Hoxhunt Human Risk Management Platform
May 11, 2022
A real approach to implementing machine learning to security awareness, by Ira Winkler
May 5, 2022
Radical Reporting author, Sara James discusses cybersecurity communication: Video and Q&A
April 27, 2022
CISO Executive Primer with Bill Bonney, Gary Hayslip, and Matt Stamper
April 1, 2022
Key takeaways from CISO Sandbox with Lisa Kubicki, DocuSign
March 10, 2022
George Finney joins the CISO Sandbox: Video and key takeaways
February 3, 2022
CISO Sandbox with Dan Lohrmann: Video and key takeaways
November 17, 2021
11 min
Mastering Cybersecurity Risk Management, with David X Martin
October 28, 2021
6 min
Key Takeaways From Hoxhunt Webinar with Dr. Rebecca Wynn
December 21, 2022
AI natural language processing and the future of phishing attacks and bypassing MFA, according to ChatGPT
November 16, 2022
Hoxhunt expert discusses ransomware and a landmark phishing study in Finland's top business publication
October 10, 2022
3 minutes
Report: SaaS permissions leave huge amounts of data exposed
September 28, 2022
4 minutes
Gone Phishin' Volume 6: Mid-to-late September, 2022
September 15, 2022
5 minutes
7 great cybersecurity awareness month ideas
September 14, 2022
5 minutes
Gone Phishin' Volume 5: early-to-mid September 2022
August 24, 2022
8 minutes
Gone Phishin': Volume 4 - Late August, 2022
August 10, 2022
5 minutes
Gone Phishin' Volume 3: Early August, 2022
April 12, 2024
11 minutes
Why You Need End User Security Training (Making the Business Case)
July 18, 2022
7 minutes
What is behavioural cybersecurity?
June 22, 2022
2 Minutes
Hoxhunt recognized by G2 as Summer 2022 Leader and Best Usability in Security Awareness Training
April 6, 2022
Biggest hidden risk in cybersec: missed phishing simulations
March 25, 2022
2 Minutes
Hoxhunt recognized by G2 as Spring 2022 Leader and Best Usability in Security Awareness Training. G2 reviewers vote us into top place overall for Satisfaction and Ease of Use.
March 17, 2022
Introducing the Hoxhunt Behavioral Cybersecurity Report
December 20, 2021
3 minutes
Log4j Log4shell vulnerability explained: Just when you thought it was safe to go on winter holiday
December 15, 2021
2 Minutes
Hoxhunt recognized as G2 Winter 2022 Leader in Security Awareness Training
December 21, 2021
9 minutes
Cybersecurity awareness training and cyber insurance: at the crossroads
November 29, 2021
2 Minutes
Change this one default setting in your Azure AD
October 1, 2021
9 min
Cybersecurity Month: TreeSolution's 5 tips on cybersecurity
September 7, 2021
4 min
ISO/IEC 27001 compliance and cybersecurity awareness training
September 3, 2021
3 min
Hoxhunt Recognized In The 2021 Gartner Market Guide (SACBT)
August 12, 2021
6 min
Why Business Email Compromise Attack Is The King Of Cybercrime
July 1, 2021
6 min
Guide to the DoD Phishing Awareness Challenge: 9 key takeaways
June 18, 2021
7 min
The Difference Between Measured & True Risk Of Phishing
June 1, 2021
11 min
Positive, Not Punitive Cybersecurity Awareness Training
November 7, 2023
10 steps to award-winning cybersecurity training: The AES CSO50 Playbook
May 31, 2022
The winding road to Hoxhunt’s $40 million Series B funding round leads to the moon, with Mika Aalto, Hoxhunt co-Founder and CEO
March 4, 2022
The origins of the most brutal phishing techniques
January 13, 2022
2 minutes
Recruitment Scams: The hacker ate my homework!
December 29, 2021
3 minutes
Loan scam emails
December 22, 2021
2 min
Copyright infringement phishing attacks
December 16, 2021
3 minutes
Top 3 Banking Phish of Winter 2021
December 9, 2021
3 minutes
Ransomware for insider activation: $10,000 for 2 clicks
December 3, 2021
2 minutes
Open Redirects - Weaponizing Trust Built by Legitimate Companies
November 12, 2021
6 min
Deliveroo feedback survey phishing email
November 19, 2021
6 min
How hackers bypass multi-factor authentication
November 12, 2021
6 min
Funds transfer phishing attacks work better with a crisis
November 5, 2021
5 min
4 ways how hackers bypass email filters
October 29, 2021
6 min
Porn scams, Ooh la la
October 21, 2021
9 min
Top 4 Official Authority Impersonation Phishing Attacks of 2021
October 13, 2021
4 min
Right to left override attacks are relics no more
October 7, 2021
6 min
New gift card phishing attacks
September 29, 2021
4 min
New cryptocurrency phishing attacks
September 23, 2021
3 min
Domain registration phishing attack
September 15, 2021
6 min
New tax phishing attack: CP-2100 Notice Campaign
September 6, 2021
6 min
Top 5 things lurking behind forbidden phishing links
September 1, 2021
6 min
Social media phishing campaigns
August 25, 2021
4 min
Hit and run phishing attack
August 11, 2021
3 min
A phish named malware: Email verification scam
August 6, 2021
4 min
Secure message phish: Login to get scammed
July 30, 2021
3 min
HR payroll phishing scam
June 30, 2021
4 min
Dawn of the undead king of malware, Emotet
February 6, 2024
“A Friendly Warning”: Phishing Emails Posing as Alerts
March 15, 2023
ChatGPT vs. human phishing and social engineering study: Who's better?
March 10, 2022
7 min
What Is Phishing Training?
April 25, 2022
6 min
10 Phishing Training Lessons For Your Employees
October 24, 2022
7 minutes
How much does phishing really cost businesses?
October 12, 2022
5 minutes
Gone Phishin' Volume 7: Early to mid October, 2022
October 7, 2022
Infographic: Data breaches in the workplace
September 19, 2022
7 minutes
GTA 6 leaks and Uber hacked through social engineering
July 22, 2022
6 minutes
Gone Phishin' volume 2: late July 2022
July 7, 2022
5 minutes
Gone Phishing: Biweekly Media Roundup #1
June 30, 2022
5 minutes
Phishing services are surprisingly cheap
April 26, 2022
3 mins
Infographic: Make-or-Break Phishing Metrics
January 23, 2024
5 Minutes
What are the top 10 costs of phishing?
December 10, 2021
5 Minutes
What is the real cost of phishing in 2021?
August 27, 2021
5 min
What is A Spear-Phishing Attack and How Do You Recognize It?
August 12, 2021
5 min
5 Ways to Prevent Business Email Compromise Attacks
December 6, 2023
7 min
Gamification in security awareness training
March 2, 2021
7 min
Are phishing tests enough to measure resilience?
March 1, 2021
7 min
Cybersecurity in a hybrid work environment
February 8, 2021
7 min
A guide to effective phishing training
September 13, 2023
2,000+ reviews and counting: Hoxhunt continues as G2 category leader in Fall 2023 reports
June 28, 2023
Track your human cyber-risk by calculating your security score
June 29, 2023
Are you minimizing your human cyber-risk? See how you compare to your industry peers
June 16, 2023
G2 Summer 2023 Awards recognize Hoxhunt as category leader
May 31, 2023
Make addressing reported threats easier with our new Incident Orchestration suite
April 25, 2024
How to Influence Security Behaviors: Insights from "The Human Element" Webinar Series
June 9, 2020
5 min
What you should do to reduce human risk
May 29, 2020
5 min
How human error impacts human risk in cybersecurity?
May 20, 2020
5 min
5 ways attackers can bypass two-factor authentication
December 20, 2019
4 min
A Bug in G Suite Lets Attackers Spread Malware on Your Computer
April 5, 2024
2 minutes
Threat feed week 14: IT and HR Impersonations, and more phishing attacks
March 29, 2024
2 minutes
Threat feed week 13: Starbucks, Microsoft, PayPal, Apple Pay, and more phishing attacks
March 8, 2024
Threat feed week 10: eBay, Microsoft, Disney+, and more phishing attacks
March 1, 2024
Threat feed week 9: UPS, PostNord, Danske Bank, and more impersonations
February 23, 2024
Threat feed week 8: National Bank of Greece, Posti, and S-Pankki impersonations