Blog > Page 57

Stay sharp with security insights

SIGRed – Critical Microsoft Vulnerability

SIGRed – Critical Microsoft Vulnerability

July 15, 2020: Cybersecurity researchers today disclosed a new highly critical "wormable"...

Read more
CyberHoot July 2020 Press Release

CyberHoot July 2020 Press Release

Click Image To View Larger Version CyberHoot’s Press Releases are published on a monthly basis. To...

Read more
Hacker’s Latest Scam: Pet Adoptions

Hacker’s Latest Scam: Pet Adoptions

Since Coronavirus (COVID-19) gained pandemic status in early March 2020, hackers have been attacking...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Cryptanalysis

Cryptanalysis

Cryptanalysis is the decryption and analysis of codes, ciphers or encrypted text. Cryptanalysis uses...

Read more
Bloatware

Bloatware

Bloatware is software that comes pre-installed with the purchase of a new computer or device. Many...

Read more
Trialware

Trialware

Trialware is software that can be used for a short period of time before it expires. In order to keep...

Read more
Piggybacking

Piggybacking

Piggybacking is a form of cyber attack where a hacker(s) gain access to an unauthorized network,...

Read more
Adware

Adware

Adware and Madware are advertising supported software that displays, typically unwanted advertisements,...

Read more
Social Media Used To Catch Violent Protester

Social Media Used To Catch Violent Protester

7-7-2020 1:34pm Correction: The original article stated Facial Recognition was used to catch protester....

Read more
Disinformation

Disinformation

Disinformation is false or misleading information intentionally spread to deceive viewers and/or...

Read more
Cookie

Cookie

A Cookie, or web cookie, is a small data file used by computers to track website communications and...

Read more
Malware in Macs

Malware in Macs

The Mac Myth Apple's Mac Operating Systems (OS) is impenetrable to malware. Myth. Recent malware...

Read more
Testimonials

See who's talking about Cyberhoot

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Ahmed Albalooshi, Advantari Digital Solutions, CEO
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator