"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Image Source Public Key Cryptography is technically known as asymmetric encryption, is a...
Read moreImage Source An Adversary is an individual, group, organization, or government that conducts or has...
Read moreImage Source Antivirus Software is a program that monitors a computer or network to detect or...
Read moreCompromised Credentials occurs when an unsuspecting user's login username and password are in the possession...
Read moreThis past Thanksgiving weekend, 110 healthcare facilities were infected by a ransomware attack on their IT...
Read moreWho is most likely to fall victim to Cyber Monday phishing scams? People who don't know about phishing scams,...
Read moreTyposquatting is also called URL hijacking. It is a form of cybersquatting which relies on mistakes such as...
Read moreGeorge Santayana (Sketch artist: Samuel Johnson Woolf) "Those who cannot remember the past are condemned to...
Read moreCyberHoot has learned there is a new Zero-Day vulnerability in Chrome actively being exploited in the Wild. Your...
Read moreThe City of Johanessburg (COJ) experienced its second ransomware attack this year. In July a Database, internal...
Read moreOctober is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and...
Read moreThe FBI issued a stern warning in February 2019. They witnessed multiple Managed Service Providers...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.