CyberHoot June Newsletter: Stay Informed, Stay Secure
Welcome to the June edition of CyberHoot’s newsletter, where we keep you up to speed on the latest cybersecurity threats and best practices to protect your organization. This month, we’re spotlighting several critical developments that demand your attention—from newly discovered Apple AirPlay vulnerabilities impacting millions of users, to a concerning exploit involving Zoom’s remote control feature. We also dive into the growing threat of fraudulent worker scams and explore how strengthening HR security processes can serve as a powerful first line of defense.
Don’t miss these essential reads to stay ahead of cyber threats and safeguard your digital ecosystem.
Apple’s AirPlay protocol is under fire as newly discovered “AirBorne” vulnerabilities expose billions of devices to zero-click attacks, data theft, and network-spreading malware—highlighting urgent security gaps in both Apple and third-party ecosystems.
A new cyberattack campaign dubbed “Elusive Comet” is exploiting Zoom’s remote control feature through social engineering to infiltrate the systems of cryptocurrency traders and venture capitalists, enabling malware deployment and data theft.
Discover how HR teams can counter rising tech job scams by enhancing identity verification, interview processes, and ongoing employee monitoring to protect against fraudulent remote workers.
Liking CyberHoot? We need your help. Please leave us a review using the links below!
TrustPilot.com | G2.com | Capterra.com | Google.com | TrustRadius.com | Gartner.com
For more information on how to leave a CyberHoot review, please watch the brief video overviews below. Note: to avoid fraudulent reviews, each review website will require to you to create and validate your identity through an email account registration process.
Wiper Malware is malicious software that wipes away everything that comes in its path. The sole purpose of this malware is to cause destruction of the victim’s devices. This malware destroys the Master Boot Record of a computer making it inoperable. While it can end up causing substantial financial losses for the affected parties, its primary goal is not to steal money or sell information to cybercriminals but rather the destruction of information itself and/or the device.
General Release Notes
Set up a HootPhish Challenge to Test your Phishing Knowledge in a Fun Game!
Enroll in CyberHoot’s Referral Program today and start earning a 20% share of all revenue generated for one year by those who register through your exclusive referral link. As a referral partner, not only will you receive financial rewards, but you’ll also experience the satisfaction of aiding others in becoming more security-conscious, safeguarding them against cyber threats. Don’t hesitate, sign up now at https://cyberhoot.com/referral-program/.
Referral through Autopilot’s Dashboard:
Join CyberHoot in our mission to create a more aware and better secured world! Recommend CyberHoot Autopilot to a friend, and they will enjoy a complimentary first month. For every new sign up who uses your referral link, you will receive a free month added to your account. This offer is exclusively for first-time CyberHoot registrants.
Know someone who had a close call recently with a cyber attack, phishing email, or social engineering phone call? Recommend CyberHoot’s free Cyber Literacy 101 training. They’ll receive six (6) videos (each video is 3-4min.) and one of our positive reinforcement, hyper-realistic, phishing simulations. All for free.
Registration: https://cyberhoot.com/individuals
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.