"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Image Source An Adversary is an individual, group, organization, or government that conducts or has...
Read moreImage Source Antivirus Software is a program that monitors a computer or network to detect or...
Read moreCompromised Credentials occurs when an unsuspecting user's login username and password are in the possession...
Read moreThis past Thanksgiving weekend, 110 healthcare facilities were infected by a ransomware attack on their IT...
Read moreWho is most likely to fall victim to Cyber Monday phishing scams? People who don't know about phishing scams,...
Read moreTyposquatting is also called URL hijacking. It is a form of cybersquatting which relies on mistakes such as...
Read moreGeorge Santayana (Sketch artist: Samuel Johnson Woolf) "Those who cannot remember the past are condemned to...
Read moreCyberHoot has learned there is a new Zero-Day vulnerability in Chrome actively being exploited in the Wild. Your...
Read moreThe City of Johanessburg (COJ) experienced its second ransomware attack this year. In July a Database, internal...
Read moreOctober is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...
Read moreThe FBI issued a stern warning in February 2019. They witnessed multiple Managed Service Providers...
Read moreAs part of National Cybersecurity Awareness Month (NCAM), CyberHoot strives to share topics that broaden...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.