Blog > Page 2

Advisory


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
USPS Text Scam: Cybercriminals Hiding Malicious PDFs

USPS Text Scam: Cybercriminals Hiding Malicious PDFs

In the ever-evolving landscape of cybercrime, scammers are constantly finding innovative ways to...

Read more
U.S Navy Limits DeepSeek AI Over Cybersecurity Concerns

U.S Navy Limits DeepSeek AI Over Cybersecurity Concerns

Three weeks ago a new AI service came to market called DeepSeek.  Competing with US AI startup...

Read more
Critical Advisory: FortiGate SSL VPN Breach

Critical Advisory: FortiGate SSL VPN Breach

Incident Overview A significant breach affecting FortiGate’s SSL VPNs has exposed vulnerabilities in nearly all...

Read more
Beware of FireScam: Malware Masquerading as Telegram

Beware of FireScam: Malware Masquerading as Telegram

In a disturbing development for Android users, cybersecurity experts have uncovered a new malware campaign known...

Read more
How to Keep Your Text Messages Secure in an Era of Rising Cyber Threats

How to Keep Your Text Messages Secure in an Era of Rising Cyber Threats

Text messaging has become an integral part of modern communication, from personal chats to sharing sensitive...

Read more
Critical Advisory: Google Chrome Extensions Hacked

Critical Advisory: Google Chrome Extensions Hacked

In a stark reminder of the ever-evolving threats in cyberspace, multiple popular Google Chrome extensions have...

Read more
Over 2,000 Palo Alto Networks Firewalls Hacked via Zero-Day Vulnerabilities

Over 2,000 Palo Alto Networks Firewalls Hacked via Zero-Day Vulnerabilities

Cybercriminals have found a way to hack thousands of Palo Alto Networks firewalls. Over 2,000 devices have been...

Read more
AndroxGh0st Malware Hijacking IoT Devices

AndroxGh0st Malware Hijacking IoT Devices

Cybercriminals have found a new way to attack our devices. Recently, researchers discovered a malware called...

Read more
Midnight Blizzard: Spear-Phishing Campaign Using RDP Files

Midnight Blizzard: Spear-Phishing Campaign Using RDP Files

Cybersecurity experts recently uncovered a large-scale spear-phishing campaign by a threat actor called Midnight...

Read more
GitHub Config Breach Exposes Cloud Service Credential

GitHub Config Breach Exposes Cloud Service Credential

In the latest wave of cyber threats, a recent GitHub configuration breach has exposed sensitive...

Read more
Session Hijacking: How Cybercriminals Take Over Your Online Sessions

Session Hijacking: How Cybercriminals Take Over Your Online Sessions

According to the Verizon Data Breach report from 2023, over the past 25 years one hacker threat has remained the...

Read more
Airplane Wi-Fi Security Risks: How to Protect Your Data

Airplane Wi-Fi Security Risks: How to Protect Your Data

For years I really enjoyed working on my laptop on a plane.  Without WiFi I was disconnected from the barrage...

Read more
Testimonials

See who's talking about Cyberhoot

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO