network interface card nic

Network Interface Card (NIC)

Secure your business with CyberHoot Today!!! Sign Up Now A Network Interface Card (NIC) provides networking capabilities for a computer. It may enable a wired connection (Ethernet) or a wireless connection (Wi-Fi) …

osi model cybrary

Open Systems Interconnection (OSI) Model

The Open Systems Interconnection (OSI) Model is a conceptual model created by the International Organization for Standardization that allows various communication systems to communicate using standard protocols. In simpler terms, …

Layer 2 Network

Layer 2 Networks refers to the second layer of the Open Systems Interconnection (OSI) Model, which is the data link layer. Layer 2 Network is the link layer (second-lowest layer) …

layer 3 network cybrary

Layer 3 Network

A Layer 3 Network is the third layer of the Open Systems Interconnection (OSI) Model, or network layer. Layer 3 provides the network’s routing and switching logic that creates network …

wormable http hole

Advisory: Wormable Windows HTTP Bug

January 12th, 2022: Today Microsoft sent a notification of a critical risk to those who use Windows devices. The critical bug is CVE-2022-21907, also known as HTTP Protocol Stack Remote …

google docs comment exploit

Google Docs’ Comment Phishing Exploit

A wave of phishing attacks has been generated within Google’s cloud-based word processing solution (Google Docs) and its “Comments” feature. Attackers use the commenting feature to send malicious links to …

pvlan cybrary

Private Virtual Local Area Network (PVLAN)

Private Virtual Local Area Network (PVLAN), also known as port isolation, is a network segmentation technology for layer 2 networks, which allows for separate sub-networks, or private VLANs under the main …

fleeceware cybrary

Fleeceware

Fleeceware is a malicious application that tricks users into paying money for simple apps with functionality that’s readily available for free elsewhere. Fleeceware is successful on Google’s Play Store (rather …

md5 hash

MD5 Hash

An MD5 Hash is a hashing algorithm that is a one-way cryptographic function that accepts a message of any length as input and returns as output a fixed-length digest value …

peer to peer network cybrary

Peer-to-Peer (P2P) Network

Peer-to-Peer (P2P) Networks exist where groups or “peers” of computer systems are linked to each other through the Internet for a common purpose usually with a common application directing their …

torrent cybrary

Torrent

A Torrent is a file type used by the BitTorrent file-sharing protocol. The protocol authorizes and points to a remote server that contains the location of different remote hosts with …

pirated movie malware

Pirated Movies Containing Malware

ReasonLabs, a provider of cybersecurity prevention and detection software, recently discovered a new form of malware hacking into computers with the mask of the latest Spiderman movie. The movie is …

Mean Time To Respond (MTTR)

Mean Time To Respond (MTTR) is the average time required to return a system to operational condition after receiving notification of a failure or cyberattack. MTTR represents the security of …

december newsletter

CyberHoot Newsletter – December 2021

Software as a Service (SaaS) Risks and Challenges Software as a Service (SaaS) applications have transformed businesses over the last decade providing enormous value. SaaS solutions have enabled businesses to …

Mean Time To Detect (MTTD)

Mean Time To Detect (MTTD), also known as Mean Time To Identify (MTTI), is one of the main key performance indicators in Incident Management. MTTD refers to the mean (average) …

saas security risks

Software as a Service (SaaS) Risks and Challenges

Software as a Service (SaaS) applications have transformed businesses over the last decade with enormous value. SaaS solutions have enabled and empowered businesses to continue operating during the pandemic with …

Individual Training Confirmation

Thank you for signing up with CyberHoot for your ‘Individual’ Cybersecurity Awareness Training. You will be receiving an email from CyberHoot in the next 15 minutes with the subject line: …

periodic backups cybrary

Periodic Backups

For decades now, Periodic Backups have been used to backup and safeguard critical data. Periodic backups are performed on a set schedule, rather than event-driven, such as whenever new data …

remote job scam

Job Scam Attack: Fake Offers and Checks

The pandemic has created new opportunities for social engineering attacks on unsuspecting users. One method of attack has been successful enough to force the FBI to release a warning. Cybercriminals …

backup versioning cybrary

Backup Versioning

Backup Versioning is when a backup solution allows a computer file to exist with several archived versions. Most common backup versioning file systems keep a number of old copies of the …

black friday cyberhoot

Be Wary of ‘Black Friday’ Scams

Finally, we’ve made it through the majority of 2021 and into the Holiday season, allowing us to celebrate by getting together with family and friends and perhaps do a little …

FedEx Smishing Scam

‘Tis The Season To Be Smished

The holiday shopping season means big business for retailers around the world, but it unfortunately also means big business for hackers. The reasoning is, people tend to be on the …

november 2021 newsletter

CyberHoot Newsletter – November 2021

‘Tis The Season To Be Smished The holiday shopping season means big business for retailers around the world, but it unfortunately also means big business for hackers. The reasoning is, people …

network attached storage NAS

Network Attached Storage (NAS)

Network Attached Storage (NAS) is high-capacity storage that connects to your home or office network so that you and other trusted users can access your files from mobile devices and …

monero xmr

Monero Coin (XMR)

Monero Coin (XMR) is a cryptocurrency focused on ‘Privacy and Anonymity’. The privacy token runs on its own blockchain, which hides virtually all transaction details. The identity of the sender …

3-2-1 backup method

CyberHoot’s 3-2-1 Backup Guide

As the number of areas where data is stored increases, the concept of following a 3-2-1 Backup Strategy is often forgotten. While you can’t prevent every compromise of your company’s …

Vulnerability Alert Management Policy (VAMP)

A Vulnerability Alert Management Policy (VAMP) is created within an organization to establish consistent rules for the review, evaluation, application, and verification of system updates to alleviate vulnerabilities in one’s …

monero cyber criminals

Monero – The New Crypto For Hackers

Cybercriminals had a wake-up call after the FBI successfully breached a cryptocurrency wallet held by the Colonial Pipeline hackers by following the money trail on bitcoin’s public blockchain. The FBI …

2021 cybersecurity awareness month vlog

Cybersecurity Awareness Month Vlog Series 2021

Each day this month, we published a short (3–5 minute) interview CyberHoot’s Co-Owner Craig Taylor had with Mindwhirl outlining necessary topics to help improve people’s cybersecurity hygiene. Check CyberHoot’s VLOG and social media …

Vulnerability Scanning

Vulnerability Scanning is the process of identifying security weaknesses and coding flaws in systems and software running on them. This is a vital component of a vulnerability alert management program, …

vciso importance csam

vCISO, Why Do I Need One? – Day 30 of CSAM

Today is Day 30 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary topics to help improve people’s cybersecurity hygiene. Keep checking CyberHoot’s VLOG and …

prevent identity theft csam

Preventing Identity Theft – Day 23 of CSAM

Today is Day 23 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary topics to help improve people’s cybersecurity hygiene. Keep checking CyberHoot’s VLOG and …

us wws data breach

U.S. Water and Wastewater Systems Cyber Breach

The Cybersecurity and Infrastructure Agency (CISA) released an alert of an ongoing cyber threat to the U.S. Water and Wastewater Systems, also highlighting five incidents that occurred between March 2019 …