Blog > Page 7

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Critical Advisory: OpenSSH Remote Code Execution Vulnerability

Critical Advisory: OpenSSH Remote Code Execution Vulnerability

What Happened?A critical vulnerability, tracked as CVE-2023-38408, has been discovered in...

Read more
The Evolving Kill Chain (On-Premise vs. SaaS)

The Evolving Kill Chain (On-Premise vs. SaaS)

The Evolving Kill Chain Software as a Service (SaaS) has revolutionized business operations, offering convenience...

Read more
Hackers Exploiting Legitimate Websites

Hackers Exploiting Legitimate Websites

Hackers are always finding new ways to exploit vulnerabilities. Recently, a troubling trend has emerged where...

Read more
CyberHoot Newsletter – May 2024

CyberHoot Newsletter – May 2024

Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies Time-Intensive Mobile Hacks: Discover...

Read more
Understanding Credential Stuffing Attacks

Understanding Credential Stuffing Attacks

One of the latest concerns in cybersecurity is credential stuffing, a type of cyberattack that is causing...

Read more
FireTail Podcast: CyberHoot CEO Craig Taylor

FireTail Podcast: CyberHoot CEO Craig Taylor

CyberHoot CEO on FireTail: Modern Cyber's Podcast In this episode, FireTail's host Andrew speaks with Craig...

Read more
Advanced Phishing Tactics: A Hacker’s Playbook

Advanced Phishing Tactics: A Hacker’s Playbook

Phishing attacks continue to be a persistent threat. Recent developments highlight the use of innovative...

Read more
Advisory: Protecting Yourself After the Ticketmaster Data Breach

Advisory: Protecting Yourself After the Ticketmaster Data Breach

May 30th, 2024: Recent news highlighted a significant breach at Ticketmaster, affecting 560...

Read more
Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies

Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies

In today's world, our smartphones are like an extra limb. We use them for everything—keeping up...

Read more
CyberHoot Newsletter – April 2024

CyberHoot Newsletter – April 2024

Understanding the Change Healthcare Cyberattack Change Healthcare Cyberattack: Gain valuable insights into...

Read more
Ransomware Defense: Protection from Remote Access Risks

Ransomware Defense: Protection from Remote Access Risks

Ransomware Risks from Remote Access ToolsHackers are constantly evolving their tactics and...

Read more
Protecting Your Data: Lessons from the “Dropbox Sign” API and OAuth Breach

Protecting Your Data: Lessons from the “Dropbox Sign” API and OAuth Breach

Safeguarding Against API Key and OAuth Token TheftOne of the risks of using an expanding cadre of...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Ahmed Albalooshi, Advantari Digital Solutions, CEO
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering