Blog > Page 70

Stay sharp with security insights

CyberHoot Newsletter – Volume 2

CyberHoot Newsletter – Volume 2

SIM Swapping by Hacking Telecom Companies Hackers never cease to stop evolving and finding new ways to...

Read more
Clearview AI’s Groundbreaking Facial Recognition

Clearview AI’s Groundbreaking Facial Recognition

Clearview AI has created one of the broadest and most powerful facial recognition databases in the...

Read more
Facial Recognition

Facial Recognition

Facial Recognition is an increasingly effective and popular technology capable of identifying a...

Read more

Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!

User Datagram Protocol (UDP)

User Datagram Protocol (UDP)

User Datagram Protocol (UDP) is an alternative communications protocol to Transmission Control Protocol...

Read more
Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP)

Internet Control Message Protocol (ICMP) is a special type of packet used for inter-device...

Read more
Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP)

Transmission Control Protocol (TCP) is a standard that defines how to establish and maintain a...

Read more
DNS Reflection and Amplification Attacks

DNS Reflection and Amplification Attacks

A DNS Reflection Attack, also known as a DNS Amplification Attack, is a form of a Distributed Denial of...

Read more
SIM Swapping by Hacking Telecom Companies

SIM Swapping by Hacking Telecom Companies

Hackers never cease to stop evolving and finding new ways to get your information. Hackers...

Read more
Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP)

Remote Desktop Protocol (RDP) is software commonly used by customer support representatives...

Read more
False Flag

False Flag

A False Flag is the pretending to be one hacking entity when you are in fact another. False...

Read more
Critical Microsoft Vulnerabilities

Critical Microsoft Vulnerabilities

January 14th, 2020: Today Microsoft released their monthly patches and amongst them were three critical Severity...

Read more
SIM Swapping

SIM Swapping

SIM Swapping is a term used when hackers steal a victims phone number and port or switch that...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President