top of page



How to Prevent DDoS Attacks as a Software Developer?
What is a DDoS Attack? A Denial-of-Service attack or DoS attack targets a server, service, or network, in an attempt to overwhelm or...


New Training Updates to Combat Chase Phishing Attacks
What's New at HacWare? New training content released! There is a new report and catalog to better understand how to deploy training to...


New Data Loss Prevention Training to improve Physical Security
What's New at HacWare? We have released a new micro training titled "Clean Desk Policy"! This mini cybersecurity video shows busy...


Top 8 Phishing Attacks from July 2021
The HacWare expert team has reviewed the top phishing attacks from July 2021 and put them into 8 categories. Check out our July Recap...


Phishing Integration Guide Released & Vaccination Required Scams
What's New at HacWare? There is always something new and exciting in the HacWare platform. This week we wanted to demo how easy it is to...


New Training Release & Passport Phishing Scams
What's New at HacWare? We have released a new video about Device Security! This new micro training video teaches your users about the...


New Dark Web Report Release & Spotify Website Spoofs
What's New at HacWare? Dark Web Monitoring is Free at HacWare! We are excited to announce that we have released a new dark monitoring web...


Insights Release and FBI Phishing Scams on the Rise
What's New at HacWare? Cybersecurity Insights is Power! Now you can download our phishing insights reports and check out the top how-to...


Security Training Content Creation API & Driver's License Phishing Attacks
What's New at HacWare? Now developers build powerful security training apps with their own course content! We have added new capabilities...


Training Tracking Improvements & Coinbase IOS Phishing scams
What's New at HacWare? We believe cybersecurity training should be easy for the end-users and administrators. This week we have released...


Top 8 Phishing Attacks from June 2021
The HacWare platform continuously scans the web for phishing attacks so you don't have to. Our expert team has review the top phishing...


How to Secure a Webpage from Key Leaks?
What is a Secret Key? Secret keys are commonly used amongst developers when they have to deal with APIs. A secret key, also known as a...
bottom of page