Skip to content
CyberHoot Logo
Menu
  • Products
    • Autopilot for Partners
    • Nest for Businesses
  • Pricing
    • Business
    • MSP & Partner
  • Resources
    • API
    • Blog
    • Contact Us
    • Cybrary
    • Features
    • HowTo
    • Referral Program
    • vCISO
  • Login & Trainings
  • Try for free

Author: Mike Cecco

Advisory / Blog

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

A new cyberattack campaign dubbed “Elusive Comet” is exploiting Zoom’s remote control feature through social engineering to infiltrate the systems of cryptocurrency traders and venture capitalists, enabling malware deployment and data theft.

Blog

Bolstering HR Security Processes to Counter Fraudulent Worker Scams

Discover how HR teams can counter rising tech job scams by enhancing identity verification, interview processes, and ongoing employee monitoring to protect against fraudulent remote workers.

Search

CYBERHOOT

Legal Corporation HQ

Smyrna, DE

Field Offices

Portsmouth, NH

PRODUCTS

  • Features
  • Individual Training
  • Autopilot
  • Nest
  • Referral Program
  • vCISO

Contact

  • Contact Us
  • HowTo (Self Help)
  • Privacy Policy
  • Terms Of Service
  • facebook
  • twitter
  • youtube
  • rss

RESOURCES

  • Blog
  • Case Study – MSP
  • Case Study – SMB
  • Testimonials
  • Cybrary
  • InfoGraphics
  • Newsletters
  • Press Releases
  • Video Training Library
Copyright © 2025 CyberHoot