Welcome to CyberHoot’s October Newsletter!
October is Cybersecurity Awareness Month, and this year’s theme couldn’t be clearer: stay alert, stay adaptive, and stay ahead. Cyber threats are evolving faster than ever, and this month’s CyberHoot articles dive straight into the issues that matter most.
We unpack Klopatra, a dangerous new Android trojan that secretly drains bank accounts through hidden remote access. We explore how a single reused password can unravel your entire digital life, and we show how automated vulnerability scanning and penetration testing can help build true cyber resilience. Finally, as AI adoption accelerates across industries, we break down five essential rules for using AI safely without putting your business or data at risk.
Read on, stay sharp, and keep your defenses strong.
Got Questions? Let’s Talk.
If you’d like to dive deeper into anything we’ve covered, or talk cybersecurity strategy, compliance, or training, our CTO Chuck Taylor is making time for one-on-one sessions with our subscribers.
It’s a rare chance to pick the brain of a seasoned cybersecurity leader. You can schedule a session directly below.

Klopatra: New Android Trojan Drains Bank Accounts via Hidden VNC
New Android trojan Klopatra uses hidden VNC to steal banking credentials and bypass security. Learn how to protect your devices and stop threats from impacting you.

When One Password Ends It All
Learn how one weak password destroyed a 158-year-old company and how training users on password managers and passkey adoption can better protect your business.

Automated Vulnerability Scanning and Penetration Testing Boost Cyber Resilience
Discover how automated pentesting can accelerate vulnerability management and boost your company’s Cyber Resilience.

Safe AI Adoption: Five Rules Every Business Must Follow
Discover the five essential rules for adopting AI securely while protecting sensitive data, reducing risks, and ensuring compliance.
Customer Spotlight
Liking CyberHoot? We need your help. Please leave us a review using the links below!
TrustPilot.com | G2.com | Capterra.com | Google.com | TrustRadius.com | Gartner.com
–G2
For more information on how to leave a CyberHoot review, please watch the brief video overviews below. Note: to avoid fraudulent reviews, each review website will require to you to create and validate your identity through an email account registration process.
- How to leave a TrustPilot Review
 - How to leave a G2 Review
 - How to write a Capterra.com Review
 - How to write a Google Review of CyberHoot
 - How to leave a TrustRadius Review
 - How to leave us a Gartner ‘Peer Review’ Review
 
CyberHoot Awarded Badges from G2

Cybrary Term of the Month:
Identity Management (IDM)
Identity Management (IDM) is the framework of policies, processes, and technologies used to ensure the right individuals have the right access to the right resources at the right time, and for the right reasons. IDM covers user provisioning, authentication, authorization, password management, and access governance across systems, applications, and data.
Recently Added Features
General Release Notes
- Added ‘Allow Training with Friends’ setting to customers for new train with friends feature.
 - Created ‘Train with friends’ system for my cyber rankings where users can send friends requests to see each others training activity.
 - Added advanced AttackPhish features that will give Admins the ability to select send by days, end campaign days, and auto-training actions.
 - Added annual and semi-annual to AttackPhish flex scheduling.
 - Updated AttackPhish emails to only run between 9am-5pm based on customer’s time zone.
 - Added dark web settings with the ability to enable/disable user emails. Added dark web user emails to custom messaging. Made dark web a core power up.
 - Added user compliance breakdown to my workgroup.
 - Added the abilitiy to view which AttackPhish email was sent to each user in Autopilot.
 - Redesigned customer dashboard page in Autopilot.
 - Added the ability to support multiple languages of library videos.
 - Added view AttackPhish feature to phishing library table in Power.
 - Added AttackPhish preview action in phishing table and updated campaign view icon in Power.
 - Added weekly check that will check all email addresses on suppression list and automatically remove them if they are found to be valid.
 - Added logging to who was removed from the suppression list and when.
 - Added ability to export email logs and suppression list to CSV.
 - Added Google Sync improvements and timing optimizations.
 
Check out Craig Taylor, Co-Founder & CEO of CyberHoot, Featured on The Culture Profit Podcast!
New Feature Alert: AI Support ChatBot
CyberHoot’s new ChatBot Self-Service Support is now live, providing 24×7 assistance directly inside the Admin Interface and on our CyberHoot website. Located at the bottom right of your screen, this intelligent support tool helps you find answers instantly, troubleshoot issues, and access resources without waiting for an email response.
If you need additional help, you can always reach our support team at [email protected].


Enroll in CyberHoot’s Referral Program today and start earning a 20% share of all revenue generated for one year by those who register through your exclusive referral link. As a referral partner, not only will you receive financial rewards, but you’ll also experience the satisfaction of aiding others in becoming more security-conscious, safeguarding them against cyber threats. Don’t hesitate, sign up now at https://cyberhoot.com/referral-program/.
Referral through Autopilot’s Dashboard:
Join CyberHoot in our mission to create a more aware and better secured world! Recommend CyberHoot Autopilot to a friend, and they will enjoy a complimentary first month. For every new sign up who uses your referral link, you will receive a free month added to your account. This offer is exclusively for first-time CyberHoot registrants.

CyberHoot has Free Introductory Cyber Literacy Classes
Know someone who had a close call recently with a cyber attack, phishing email, or social engineering phone call? Recommend CyberHoot’s free Cyber Literacy 101 training. They’ll receive six (6) videos (each video is 3-4min.) and one of our positive reinforcement, hyper-realistic, phishing simulations. All for free.
Registration: https://cyberhoot.com/individuals
Looking for additional resources?
CyberHoot White Paper Download – How HootPhish Improves upon AttackPhish
All New: 2025 Infographics on Cybersecurity Statistics
Secure your business with CyberHoot Today!!!
The post CyberHoot Newsletter – October 2025 appeared first on CyberHoot.


