Blog > Page 44

Stay sharp with security insights

Bluejacking

Bluejacking

Bluejacking is the unauthorized sending of messages from one Bluetooth device to another. Bluetooth is...

Read more
Ransomware Shuts Down Largest U.S. Pipeline

Ransomware Shuts Down Largest U.S. Pipeline

The United States' largest pipeline, Colonial Pipeline, halted operations due to a ransomware attack. Colonial...

Read more
Apple Zero-Day – Cybersecurity Advisory

Apple Zero-Day – Cybersecurity Advisory

May 4th, 2021: Apple has released IOS updates for 4 critical issues that impact all Mac, iOS, iPad, and...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

Apple AirDrop Vulnerability

Apple AirDrop Vulnerability

Security researchers in Germany have put out a press release about research findings to be presented at...

Read more
CyberHoot Newsletter – Volume XV

CyberHoot Newsletter – Volume XV

Israel Launches 'Stuxnet 3.0' On Iran Iran blamed Israel for an alleged cyber-attack on its...

Read more
What Was 2020’s Most Expensive Cybercrime?

What Was 2020’s Most Expensive Cybercrime?

It's apparent that ransomware and its evolution into leakware is a critical threat to most businesses...

Read more
Rootkit

Rootkit

A Rootkit is a hacking program or collection of programs that give a threat actor remote access to and control...

Read more
Threat Intelligence

Threat Intelligence

Threat Intelligence (TI) is information about current attack tactics and techniques (T&T) used by...

Read more
Threat Hunting

Threat Hunting

Threat Hunting is proactive hunting or searching through networks, endpoints, and datasets to find...

Read more
International Traffic in Arms Regulations (ITAR)

International Traffic in Arms Regulations (ITAR)

The International Traffic in Arms Regulations (ITAR) is United States regulation that controls the...

Read more
Third-Party Risk Management (TPRM)

Third-Party Risk Management (TPRM)

Third-Party Risk Management (TPRM) is the process of identifying, assessing, and controlling risks...

Read more
BYOD

BYOD

BYOD, also known as Bring Your Own Device, is a common practice of allowing employee-owned devices to...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology