Blog > Page 56

Stay sharp with security insights

JBOH (JavaScript-Binding-Over-HTTP)

JBOH (JavaScript-Binding-Over-HTTP)

JBOH (JavaScript-Binding-Over-HTTP) is a mobile device attack that enables an attacker to...

Read more
Situational Awareness

Situational Awareness

Situational awareness is knowledge combined with attitudes and behaviors that work to protect our IT...

Read more
SIGRed – Critical Microsoft Vulnerability

SIGRed – Critical Microsoft Vulnerability

July 15, 2020: Cybersecurity researchers today disclosed a new highly critical "wormable"...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

CyberHoot July 2020 Press Release

CyberHoot July 2020 Press Release

Click Image To View Larger Version CyberHoot’s Press Releases are published on a monthly basis. To...

Read more
Hacker’s Latest Scam: Pet Adoptions

Hacker’s Latest Scam: Pet Adoptions

Since Coronavirus (COVID-19) gained pandemic status in early March 2020, hackers have been attacking...

Read more
Cryptanalysis

Cryptanalysis

Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text. Cryptanalysis uses...

Read more
Bloatware

Bloatware

Bloatware is software that comes pre-installed with the purchase of a new computer or device. Many...

Read more
Trialware

Trialware

Trialware is software that can be used for a short period of time before it expires. In order to keep...

Read more
Piggybacking

Piggybacking

Piggybacking is a form of cyber attack where a hacker(s) gain access to an unauthorized network,...

Read more
Adware

Adware

Adware and Madware are advertising supported software that displays, typically unwanted advertisements,...

Read more
Social Media Used To Catch Violent Protester

Social Media Used To Catch Violent Protester

7-7-2020 1:34pm Correction: The original article stated Facial Recognition was used to catch protester....

Read more
Disinformation

Disinformation

Disinformation is false or misleading information intentionally spread to deceive viewers and/or...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer