Blog > Page 45

Stay sharp with security insights

Threat Hunting

Threat Hunting

Threat Hunting is proactive hunting or searching through networks, endpoints, and datasets to find...

Read more
International Traffic in Arms Regulations (ITAR)

International Traffic in Arms Regulations (ITAR)

The International Traffic in Arms Regulations (ITAR) is United States regulation that controls the...

Read more
Third-Party Risk Management (TPRM)

Third-Party Risk Management (TPRM)

Third-Party Risk Management (TPRM) is the process of identifying, assessing, and controlling risks...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

BYOD

BYOD

BYOD, also known as Bring Your Own Device, is a common practice of allowing employee-owned devices to...

Read more
Israel Launches ‘Stuxnet 3.0’ On Iran

Israel Launches ‘Stuxnet 3.0’ On Iran

Iran announced that a blackout occurred at its uranium enrichment facility in Natanz. Iran blamed...

Read more
Personal Information Protection and Electronic Documents Act (PIPEDA)

Personal Information Protection and Electronic Documents Act (PIPEDA)

The Personal Information Protection and Electronic Documents Act (PIPEDA) is Canada's main...

Read more
General Data Protection Regulation (GDPR)

General Data Protection Regulation (GDPR)

The General Data Protection Regulation (GDPR) was passed in the European Union (EU) in 2016 and...

Read more
Booking.com Fined Following Vishing Attack

Booking.com Fined Following Vishing Attack

Summary Message: Working out your Breach Notification during a Breach is a recipe for disaster. Back in...

Read more
Facebook Exploit – Cybersecurity Advisory

Facebook Exploit – Cybersecurity Advisory

April 2021: CyberHoot received notification of a hacking forum publishing the stolen phone numbers and...

Read more
UK Census Smishing Attack

UK Census Smishing Attack

As many know, the United States had its decennial (every ten years) census in 2020, helping determine...

Read more
Instagram Scams: How To Avoid Them

Instagram Scams: How To Avoid Them

Since Instagram's official launch in 2010, it's seen more than 1 billion accounts opened with users...

Read more
CyberHoot Newsletter – Volume XIV

CyberHoot Newsletter – Volume XIV

Twitter Steganography Risks Steganography is the interesting but potentially dangerous...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management