Blog > Page 19

Stay sharp with security insights

New Linux Kernel Bug is a Patch Now or Disable Scenario

New Linux Kernel Bug is a Patch Now or Disable Scenario

Vulnerability Details Just in time for Christmas, we have a 9.6 vulnerability (out of 10) in some Linux Kernels...

Read more
FBI’s Vetted Cybersecurity Organization “Infragard” Breached

FBI’s Vetted Cybersecurity Organization “Infragard” Breached

Infragard is a cybersecurity organization that partnered with the Federal Bureau of Investigation (FBI)  with...

Read more
“Aikido” Vulnerability Turns EDR into Wiper Malware

“Aikido” Vulnerability Turns EDR into Wiper Malware

December 7ths, 2022: A SafeBreach security researcher disclosed a vulnerability dubbed “Aikido,” with...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Don’t let the American Data Privacy and Protection Act Fizzle Out – Vote

Don’t let the American Data Privacy and Protection Act Fizzle Out – Vote

Data Privacy To date in the US: Data Privacy legislation in the US is a patchwork quilt of different statutes and...

Read more
Major Rackspace Hosted Exchange Outage: What you Need to Know and Do Now.

Major Rackspace Hosted Exchange Outage: What you Need to Know and Do Now.

12/7/2022 Update: Rackspace now acknowledges they have been the victim of a Ransomware Attack.  Tues. Dec. 6th...

Read more
New Cybersecurity Rules Proposed by SEC

New Cybersecurity Rules Proposed by SEC

The U.S. Securities and Exchange Commission (SEC) is proposing new disclosure requirements by company boards...

Read more
Royal Ransomware’s Evolving Threat Vectors

Royal Ransomware’s Evolving Threat Vectors

CyberHoot has recently seen the impact of the Royal ransomware.  An MSP had a client who refused security...

Read more
Secure Online Payment Options – Risks and Benefits

Secure Online Payment Options – Risks and Benefits

Credit cards, virtual credit cards, payment services (Venmo, Cash), and even digital wallets (Apple Pay, Google...

Read more
CyberHoot Newsletter – October 2022

CyberHoot Newsletter – October 2022

Top 10 Reasons to Conduct Awareness Training and...

Read more
Security Advisory: Citrix ADC and Gateway Authentication Bypass (Nov 2022)

Security Advisory: Citrix ADC and Gateway Authentication Bypass (Nov 2022)

November 10th, 2022: CyberHoot has learned of multiple authentication bypass vulnerabilities being reported in...

Read more
11 Reasons to Upgrade Aging Hardware and/or Software

11 Reasons to Upgrade Aging Hardware and/or Software

CyberHoot was approached by an MSP recently that was struggling to convince a client to upgrade some aging...

Read more
CyberHoot: 10 Reasons to Adopt Awareness Training

CyberHoot: 10 Reasons to Adopt Awareness Training

Why Awareness Training? Awareness Training is a key component of a strong defense-in-depth cybersecurity...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President