Blog > Page 3

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

A newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...

Read more
Bolstering HR Security Processes to Counter Fraudulent Worker Scams

Bolstering HR Security Processes to Counter Fraudulent Worker Scams

Recent reports have exposed sophisticated schemes where fraudulent technology workers, often using fake...

Read more
Malvertising Alert: Phishing Campaign Targets Onfido Users via Google Ads

Malvertising Alert: Phishing Campaign Targets Onfido Users via Google Ads

In April 2025, cybersecurity firm Push Security uncovered a sophisticated malvertising campaign targeting Onfido...

Read more
CyberHoot Newsletter – April 2025

CyberHoot Newsletter – April 2025

Welcome to CyberHoot's April Newsletter! Spring may be in full bloom, but in the digital world, threat actors...

Read more
Division of Labor in Criminal Enterprises leads to High-Volume, Low-Cost Attacks

Division of Labor in Criminal Enterprises leads to High-Volume, Low-Cost Attacks

Henry Ford revolutionized automobile manufacturing a century ago by dividing complex assembly tasks into...

Read more
Tax Season Scams: Microsoft Warns of Phishing Attacks

Tax Season Scams: Microsoft Warns of Phishing Attacks

 As the April 15 U.S. Tax Day approaches, cybercriminals are intensifying their efforts to...

Read more
Top 3 Microsoft Office Exploits Hackers Are Using in 2025—and How to Stop Them

Top 3 Microsoft Office Exploits Hackers Are Using in 2025—and How to Stop Them

​In 2025, hackers continue to exploit office files, making them a top attack vector for cybercrime....

Read more
Medusa Ransomware Deploys Malicious Driver to Evade Security

Medusa Ransomware Deploys Malicious Driver to Evade Security

As ransomware threats go, the Medusa ransomware group has a lengthy and notorious history of successfully...

Read more
CyberHoot Newsletter – March 2025

CyberHoot Newsletter – March 2025

Welcome to CyberHoot's March Newsletter!As cyber threats continue to evolve, staying informed...

Read more
Polymorphic Extensions: A New Cyber Threat Impersonating Your Add-Ons

Polymorphic Extensions: A New Cyber Threat Impersonating Your Add-Ons

In a recent revelation, cybersecurity researchers from sqrx.com have uncovered a sophisticated attack method...

Read more
The Sophisticated Malware-as-a-Service Ecosystem of EncryptHub

The Sophisticated Malware-as-a-Service Ecosystem of EncryptHub

Dark Web Hacking Groups Mirror Real-World SaaS Companies In today's hyper connected world, the distinction...

Read more
Advisory: Critical Microsoft Outlook Vulnerability

Advisory: Critical Microsoft Outlook Vulnerability

Overview A Checkpoint security researcher has discovered a critical vulnerability in Microsoft Outlook that poses...

Read more
Testimonials

See who's talking about Cyberhoot

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst