Powershell Scripting

Powershell script for avoiding SPAM, Clutter, Junk in 365

CyberHoot provides phish testing of end users to ensure they learn to pay attention to their email and the risks is presents. This article provides a Powershell script to automate the setup work required to ensure delivery of phishing test emails to end users inboxes.

Kaseya RMM Spreads Ransomware

Update and Correction – 3:30pm 7/3/21: CyberHoot has confirmed from Kaseya and other cybersecurity news sources that Webroot was not and is not a risk from this Kaseya ransomware event.  Only Kaseya …

Securing Remote Workers

COVID19 has forced many workers into work from home conditions. This has introduced new risks that are more easily addressed by cloud-enabled companies than more traditional on-premises application using companies. This article seeks to identify tips for both in securing businesses whether cloud-enabled or on-premise is your primary application source.

MAZE Ransomware: 3x Threat to Data Security

MAZE Ransomware represents a change for the worse in the capabilities of online hackers today. Traditional backup strategies are no longer enough to provide a get-out-of-jail-free card when hit with ransomware. Data confidentiality is also at risk now and that changes who will pay ransoms dramatically. Prepare now to avoid this scourge of online hacking.

Critical Microsoft Vulnerabilities

Infrequently, Microsoft released critical vulnerability alerts and patches that are so important to know about, that you should stop what you’re doing and review them and plan to patch as soon as possible. This is one of those times.

Social Media Bots

In addition to Malware Bots that do the bidding of a hacker, there are also social media “bots”.  These bots refer to automated social media accounts that publish lots of …


Network-Based Intrusion Prevention

Network-based Intrusion Prevention Services (aka NIPS) is a preemptive approach to network security used to identify potential threats and respond to them swiftly. Like network intrusion detection systems (NIDS), Network-based Intrusion Prevention System (NIPS) monitors …

Risk Reduction (Limitation)

Risk Reduction (limitation) is the most common risk management strategy used by businesses. This strategy limits a company’s exposure by taking some action. It is a strategy employing a bit …

Compromised Credentials

Compromised credentials are rampant online. Over 82% of breaches relate back to stolen passwords and phishing attacks. Learn what to do about it.

HowTo: Add a New Client to CyberHoot

This video was created specifically for MSP’s with SuperUser access to CyberHoot and its multi-tenant deployments.  Regular Administrators will not have access to these menus. This video provides you a …

Watch out for Cyber Monday Phishing Scams

Who is most likely to fall victim to Cyber Monday phishing scams? People who don’t know about phishing scams, typosquatting, and fake look-alike websites. Did you know there are 4 …



Typosquatting is also called URL hijacking. It is a form of cybersquatting which relies on mistakes such as typographical errors made by Internet users when inputting a website address into …

BlueKeep is MS Blaster

Good backups will let you go back in time to recover compromised systems. Don’t let this happen by not patching for BlueKeep now.

Google Chrome Zero Day in the Wild

CyberHoot has learned there is a new Zero-Day vulnerability in Chrome actively being exploited in the Wild. Your computer can be compromised just by visiting a malicious website. That is …