Blog > Page 90

Stay sharp with security insights

Public Key Cryptography

Public Key Cryptography

  Image Source Public Key Cryptography is technically known as asymmetric encryption, is a...

Read more
Adversary (or Attacker)

Adversary (or Attacker)

  Image Source An Adversary is an individual, group, organization, or government that conducts or has...

Read more
Antivirus Software

Antivirus Software

  Image Source Antivirus Software is a program that monitors a computer or network to detect or...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Compromised Credentials

Compromised Credentials

Compromised Credentials occurs when an unsuspecting user's login username and password are in the possession...

Read more
RYUK Ransomware infects 110 Healthcare Facilities

RYUK Ransomware infects 110 Healthcare Facilities

This past Thanksgiving weekend, 110 healthcare facilities were infected by a ransomware attack on their IT...

Read more
Watch out for Cyber Monday Phishing Scams

Watch out for Cyber Monday Phishing Scams

Who is most likely to fall victim to Cyber Monday phishing scams? People who don't know about phishing scams,...

Read more
Typosquatting

Typosquatting

Typosquatting is also called URL hijacking. It is a form of cybersquatting which relies on mistakes such as...

Read more
BlueKeep is MS Blaster

BlueKeep is MS Blaster

George Santayana (Sketch artist: Samuel Johnson Woolf) "Those who cannot remember the past are condemned to...

Read more
Google Chrome Zero Day in the Wild

Google Chrome Zero Day in the Wild

CyberHoot has learned there is a new Zero-Day vulnerability in Chrome actively being exploited in the Wild. Your...

Read more
Nightmare for the City of Johanessburg Persists Past Halloween

Nightmare for the City of Johanessburg Persists Past Halloween

The City of Johanessburg (COJ) experienced its second ransomware attack this year. In July a Database, internal...

Read more
3.5 Million Unfilled Cybersecurity Jobs by 2021

3.5 Million Unfilled Cybersecurity Jobs by 2021

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...

Read more
MSP Attacks increasing but their Ability to Defend is Lacking

MSP Attacks increasing but their Ability to Defend is Lacking

The FBI issued a stern warning in February 2019.  They witnessed multiple Managed Service Providers...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO