Blog > Page 70

Stay sharp with security insights

CyberHoot Newsletter – Volume 2

CyberHoot Newsletter – Volume 2

SIM Swapping by Hacking Telecom Companies Hackers never cease to stop evolving and finding new ways to...

Read more
Clearview AI’s Groundbreaking Facial Recognition

Clearview AI’s Groundbreaking Facial Recognition

Clearview AI has created one of the broadest and most powerful facial recognition databases in the...

Read more
Facial Recognition

Facial Recognition

Facial Recognition is an increasingly effective and popular technology capable of identifying a...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

User Datagram Protocol (UDP) is an alternative communications protocol to Transmission Control Protocol...

Read more
Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) is a special type of packet used for inter-device...

Read more
Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a...

Read more
DNS Reflection and Amplification Attacks

DNS Reflection and Amplification Attacks

A DNS Reflection Attack, also known as a DNS Amplification Attack, is a form of a Distributed Denial of...

Read more
SIM Swapping by Hacking Telecom Companies

SIM Swapping by Hacking Telecom Companies

Hackers never cease to stop evolving and finding new ways to get your information. Hackers...

Read more
Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP) is software commonly used by customer support representatives...

Read more
False Flag

False Flag

A False Flag is the pretending to be one hacking entity when you are in fact another. False...

Read more
Critical Microsoft Vulnerabilities

Critical Microsoft Vulnerabilities

January 14th, 2020: Today Microsoft released their monthly patches and amongst them were three critical Severity...

Read more
SIM Swapping

SIM Swapping

SIM Swapping is a term used when hackers steal a victims phone number and port or switch that...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director