Blog > Page 44

Stay sharp with security insights

Zero Trust

Zero Trust

Zero Trust is a security strategy focused on the belief that organizations shouldn't automatically...

Read more
Clickjacking

Clickjacking

Clickjacking, also known as a “UI Redress Attack”, is when an attacker uses multiple transparent or...

Read more
Pipeline Breach Prompts Texas To Require Cybersecurity Training

Pipeline Breach Prompts Texas To Require Cybersecurity Training

May 17, 2021: Following the Ransomware Attack on the Colonial Pipeline, Texas Governor Greg Abbott took...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Ransomware Task Force (RTF)

Ransomware Task Force (RTF)

The Ransomware Task Force (RTF) is a group of high-profile security vendors who teamed up with the...

Read more
Bluejacking

Bluejacking

Bluejacking is the unauthorized sending of messages from one Bluetooth device to another. Bluetooth is...

Read more
Ransomware Shuts Down Largest U.S. Pipeline

Ransomware Shuts Down Largest U.S. Pipeline

The United States' largest pipeline, Colonial Pipeline, halted operations due to a ransomware attack. Colonial...

Read more
Apple Zero-Day – Cybersecurity Advisory

Apple Zero-Day – Cybersecurity Advisory

May 4th, 2021: Apple has released IOS updates for 4 critical issues that impact all Mac, iOS, iPad, and...

Read more
Apple AirDrop Vulnerability

Apple AirDrop Vulnerability

Security researchers in Germany have put out a press release about research findings to be presented at...

Read more
CyberHoot Newsletter – Volume XV

CyberHoot Newsletter – Volume XV

Israel Launches 'Stuxnet 3.0' On Iran Iran blamed Israel for an alleged cyber-attack on its...

Read more
What Was 2020’s Most Expensive Cybercrime?

What Was 2020’s Most Expensive Cybercrime?

It's apparent that ransomware and its evolution into leakware is a critical threat to most businesses...

Read more
Rootkit

Rootkit

A Rootkit is a hacking program or collection of programs that give a threat actor remote access to and control...

Read more
Threat Intelligence

Threat Intelligence

Threat Intelligence (TI) is information about current attack tactics and techniques (T&T) used by...

Read more
Testimonials

See who's talking about Cyberhoot

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
Robyn Dunlap, Franklin Schools, Director of Technology