Blog > Page 15

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
“Aikido” Vulnerability Turns EDR into Wiper Malware

“Aikido” Vulnerability Turns EDR into Wiper Malware

December 7ths, 2022: A SafeBreach security researcher disclosed a vulnerability dubbed “Aikido,” with...

Read more
Don’t let the American Data Privacy and Protection Act Fizzle Out – Vote

Don’t let the American Data Privacy and Protection Act Fizzle Out – Vote

Data Privacy To date in the US: Data Privacy legislation in the US is a patchwork quilt of different statutes and...

Read more
Major Rackspace Hosted Exchange Outage: What you Need to Know and Do Now.

Major Rackspace Hosted Exchange Outage: What you Need to Know and Do Now.

12/7/2022 Update: Rackspace now acknowledges they have been the victim of a Ransomware Attack.  Tues. Dec. 6th...

Read more
New Cybersecurity Rules Proposed by SEC

New Cybersecurity Rules Proposed by SEC

The U.S. Securities and Exchange Commission (SEC) is proposing new disclosure requirements by company boards...

Read more
Royal Ransomware’s Evolving Threat Vectors

Royal Ransomware’s Evolving Threat Vectors

CyberHoot has recently seen the impact of the Royal ransomware.  An MSP had a client who refused security...

Read more
Secure Online Payment Options – Risks and Benefits

Secure Online Payment Options – Risks and Benefits

Credit cards, virtual credit cards, payment services (Venmo, Cash), and even digital wallets (Apple Pay, Google...

Read more
CyberHoot Newsletter – October 2022

CyberHoot Newsletter – October 2022

Top 10 Reasons to Conduct Awareness Training and...

Read more
Security Advisory: Citrix ADC and Gateway Authentication Bypass (Nov 2022)

Security Advisory: Citrix ADC and Gateway Authentication Bypass (Nov 2022)

November 10th, 2022: CyberHoot has learned of multiple authentication bypass vulnerabilities being reported in...

Read more
11 Reasons to Upgrade Aging Hardware and/or Software

11 Reasons to Upgrade Aging Hardware and/or Software

CyberHoot was approached by an MSP recently that was struggling to convince a client to upgrade some aging...

Read more
CyberHoot: 10 Reasons to Adopt Awareness Training

CyberHoot: 10 Reasons to Adopt Awareness Training

Why Awareness Training? Awareness Training is a key component of a strong defense-in-depth cybersecurity...

Read more
Cybersecurity Awareness Month – Malicious Websites

Cybersecurity Awareness Month – Malicious Websites

Malicious Websites are Everywhere Traveling the Internet from website to website carries with it a certain risk...

Read more
Cybersecurity Awareness Month – Insider Attacks

Cybersecurity Awareness Month – Insider Attacks

What harm can come from Insider Attacks? Each year since Covid hit, employees have been resigning in ever...

Read more
Testimonials

See who's talking about Cyberhoot

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"I reviewed over a dozen learning management platforms, and I have to say, CyberHoot is soaring way above the others."
Nick Marteney, MotherBear Security, Co-Founder & CEO
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology