Blog > Page 7

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Understanding the CrowdStrike Global Outage

Understanding the CrowdStrike Global Outage

On Fri. July 19th, CrowdStrike, a leading provider of Endpoint Detection and Response services, caused the...

Read more
Cybersecurity Perspective on the Ticketmaster-Taylor Swift Incident

Cybersecurity Perspective on the Ticketmaster-Taylor Swift Incident

Ticketmaster, the undisputed giant of event ticketing, recently found itself at the center of a unique...

Read more
How MFA Failures and Rising Ransomware Costs are Threatening Cybersecurity

How MFA Failures and Rising Ransomware Costs are Threatening Cybersecurity

The cybersecurity landscape is becoming increasingly perilous, with ransomware costs surging by an alarming 500%...

Read more
Critical Advisory: OpenSSH Remote Code Execution Vulnerability

Critical Advisory: OpenSSH Remote Code Execution Vulnerability

What Happened?A critical vulnerability, tracked as CVE-2023-38408, has been discovered in...

Read more
The Evolving Kill Chain (On-Premise vs. SaaS)

The Evolving Kill Chain (On-Premise vs. SaaS)

The Evolving Kill Chain Software as a Service (SaaS) has revolutionized business operations, offering convenience...

Read more
Hackers Exploiting Legitimate Websites

Hackers Exploiting Legitimate Websites

Hackers are always finding new ways to exploit vulnerabilities. Recently, a troubling trend has emerged where...

Read more
CyberHoot Newsletter – May 2024

CyberHoot Newsletter – May 2024

Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies Time-Intensive Mobile Hacks: Discover...

Read more
Understanding Credential Stuffing Attacks

Understanding Credential Stuffing Attacks

One of the latest concerns in cybersecurity is credential stuffing, a type of cyberattack that is causing...

Read more
FireTail Podcast: CyberHoot CEO Craig Taylor

FireTail Podcast: CyberHoot CEO Craig Taylor

CyberHoot CEO on FireTail: Modern Cyber's Podcast In this episode, FireTail's host Andrew speaks with Craig...

Read more
Advanced Phishing Tactics: A Hacker’s Playbook

Advanced Phishing Tactics: A Hacker’s Playbook

Phishing attacks continue to be a persistent threat. Recent developments highlight the use of innovative...

Read more
Advisory: Protecting Yourself After the Ticketmaster Data Breach

Advisory: Protecting Yourself After the Ticketmaster Data Breach

May 30th, 2024: Recent news highlighted a significant breach at Ticketmaster, affecting 560...

Read more
Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies

Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies

In today's world, our smartphones are like an extra limb. We use them for everything—keeping up...

Read more
Testimonials

See who's talking about Cyberhoot

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
Robyn Dunlap, Franklin Schools, Director of Technology
"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Ahmed Albalooshi, Advantari Digital Solutions, CEO