Blog > Page 5

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Prevention Techniques for Top 10 Common Cyber Attacks

Prevention Techniques for Top 10 Common Cyber Attacks

Last week we wrote about what an employee might first witness when facing 10 common cyber attacks. Then we...

Read more
CyberHoot Newsletter – June and July 2024

CyberHoot Newsletter – June and July 2024

July - 2024 Understanding the CrowdStrike Global Outage Learn about the CrowdStrike global outage, its...

Read more
Top 10 Cyber Attacks and How to Respond

Top 10 Cyber Attacks and How to Respond

Every workday brings new challenges and surprises, especially when it comes to cybersecurity. This guide helps...

Read more
Understanding the CrowdStrike Global Outage

Understanding the CrowdStrike Global Outage

On Fri. July 19th, CrowdStrike, a leading provider of Endpoint Detection and Response services, caused the...

Read more
Cybersecurity Perspective on the Ticketmaster-Taylor Swift Incident

Cybersecurity Perspective on the Ticketmaster-Taylor Swift Incident

Ticketmaster, the undisputed giant of event ticketing, recently found itself at the center of a unique...

Read more
How MFA Failures and Rising Ransomware Costs are Threatening Cybersecurity

How MFA Failures and Rising Ransomware Costs are Threatening Cybersecurity

The cybersecurity landscape is becoming increasingly perilous, with ransomware costs surging by an alarming 500%...

Read more
Critical Advisory: OpenSSH Remote Code Execution Vulnerability

Critical Advisory: OpenSSH Remote Code Execution Vulnerability

What Happened?A critical vulnerability, tracked as CVE-2023-38408, has been discovered in...

Read more
The Evolving Kill Chain (On-Premise vs. SaaS)

The Evolving Kill Chain (On-Premise vs. SaaS)

The Evolving Kill Chain Software as a Service (SaaS) has revolutionized business operations, offering convenience...

Read more
Hackers Exploiting Legitimate Websites

Hackers Exploiting Legitimate Websites

Hackers are always finding new ways to exploit vulnerabilities. Recently, a troubling trend has emerged where...

Read more
CyberHoot Newsletter – May 2024

CyberHoot Newsletter – May 2024

Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies Time-Intensive Mobile Hacks: Discover...

Read more
Understanding Credential Stuffing Attacks

Understanding Credential Stuffing Attacks

One of the latest concerns in cybersecurity is credential stuffing, a type of cyberattack that is causing...

Read more
FireTail Podcast: CyberHoot CEO Craig Taylor

FireTail Podcast: CyberHoot CEO Craig Taylor

CyberHoot CEO on FireTail: Modern Cyber's Podcast In this episode, FireTail's host Andrew speaks with Craig...

Read more
Testimonials

See who's talking about Cyberhoot

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO