Blog > Page 2

Advisory


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Critical Advisory: FortiGate SSL VPN Breach

Critical Advisory: FortiGate SSL VPN Breach

Incident Overview A significant breach affecting FortiGate’s SSL VPNs has exposed vulnerabilities in nearly all...

Read more
Beware of FireScam: Malware Masquerading as Telegram

Beware of FireScam: Malware Masquerading as Telegram

In a disturbing development for Android users, cybersecurity experts have uncovered a new malware campaign known...

Read more
How to Keep Your Text Messages Secure in an Era of Rising Cyber Threats

How to Keep Your Text Messages Secure in an Era of Rising Cyber Threats

Text messaging has become an integral part of modern communication, from personal chats to sharing sensitive...

Read more
Critical Advisory: Google Chrome Extensions Hacked

Critical Advisory: Google Chrome Extensions Hacked

In a stark reminder of the ever-evolving threats in cyberspace, multiple popular Google Chrome extensions have...

Read more
Over 2,000 Palo Alto Networks Firewalls Hacked via Zero-Day Vulnerabilities

Over 2,000 Palo Alto Networks Firewalls Hacked via Zero-Day Vulnerabilities

Cybercriminals have found a way to hack thousands of Palo Alto Networks firewalls. Over 2,000 devices have been...

Read more
AndroxGh0st Malware Hijacking IoT Devices

AndroxGh0st Malware Hijacking IoT Devices

Cybercriminals have found a new way to attack our devices. Recently, researchers discovered a malware called...

Read more
Midnight Blizzard: Spear-Phishing Campaign Using RDP Files

Midnight Blizzard: Spear-Phishing Campaign Using RDP Files

Cybersecurity experts recently uncovered a large-scale spear-phishing campaign by a threat actor called Midnight...

Read more
GitHub Config Breach Exposes Cloud Service Credential

GitHub Config Breach Exposes Cloud Service Credential

In the latest wave of cyber threats, a recent GitHub configuration breach has exposed sensitive...

Read more
Session Hijacking: How Cybercriminals Take Over Your Online Sessions

Session Hijacking: How Cybercriminals Take Over Your Online Sessions

According to the Verizon Data Breach report from 2023, over the past 25 years one hacker threat has remained the...

Read more
Airplane Wi-Fi Security Risks: How to Protect Your Data

Airplane Wi-Fi Security Risks: How to Protect Your Data

For years I really enjoyed working on my laptop on a plane.  Without WiFi I was disconnected from the barrage...

Read more
Dual Critical Advisory: Critical Vulnerabilities in Veeam Backup & Replication and SonicWall SonicOS

Dual Critical Advisory: Critical Vulnerabilities in Veeam Backup & Replication and SonicWall SonicOS

Veeam Backup & Replication: Critical Patches for Vulnerabilities Overview: Veeam released patches for 13...

Read more
New Qilin Ransomware Attack

New Qilin Ransomware Attack

A new strain of ransomware, dubbed Qilin, is targeting VPN networks with stolen or harvested credentials. ...

Read more
Testimonials

See who's talking about Cyberhoot

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director