top of page



Emerging trends in phishing that MSPs should share with their SMB clients
Hackers typically evolve their attacks over time and we can spot types that are new, growing in popularity or testing changing techniques


6 AI-related cybersecurity scams your end users should be aware of
These six AI-chatbot-related cybersecurity scams have been spotted on the threat landscape since the release of ChatGPT.


How HacWare's innovative phishing simulations are changing the game for MSPs
With HacWare, the phishing simulations your client’s users receive are created using our patent-pending generative AI tool. This means that


Apptega and HacWare partner to help MSPs
Apptega and HacWare partner to help MSPs build world-class compliance programs through AI-driven cybersecurity training.


AI Chatbots and cybersecurity: How safe is it for your end users to use ChatGPT?
When users lack an understanding of the capabilities and risks of AI, they may be more likely to engage in cyber-risky behaviors.


Hybrid Phishing Attacks | Webinar
Hybrid phishing attacks are on the rise. This attack type, where hackers use multiple types of phishing to drive end user responses...


Hybrid phishing: attacks from trusted domains
There are a few common indications of phishing emails — spelling and grammar errors, unusual subject lines, or a sender’s address with an...


Mailprotector Whitelisting Documentation
How to whitelist Mailprotector for HacWare Partner access. Details on creating the message rule and allow list for domains.


The Road to MSP Compliance | Webinar
HacWare Channel Chief, Juan Fernandez and DNS Filter Partner Alliance Manager, Dominickus Wells, discuss what compliance is and why it...


Understanding Malware: RATs (Remote Access Trojans)
RATs, Remote Access Trojans, are a malware tool that gives bad actors the ability to gain unauthorized access to a victim’s PC. They...


What are insider threats?
The microtraining course: Insider Threats is available in the Partner Portal now! What are insider threats? Insider threats are the...


What is the principle of least privilege?
The microtraining course: Principle of Least Privilege is available in the HacWare LMS! What is the principle of least privilege? The...
bottom of page