Blog > Page 3

Advisory


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
GitHub Config Breach Exposes Cloud Service Credential

GitHub Config Breach Exposes Cloud Service Credential

In the latest wave of cyber threats, a recent GitHub configuration breach has exposed sensitive...

Read more
Session Hijacking: How Cybercriminals Take Over Your Online Sessions

Session Hijacking: How Cybercriminals Take Over Your Online Sessions

According to the Verizon Data Breach report from 2023, over the past 25 years one hacker threat has remained the...

Read more
Airplane Wi-Fi Security Risks: How to Protect Your Data

Airplane Wi-Fi Security Risks: How to Protect Your Data

For years I really enjoyed working on my laptop on a plane.  Without WiFi I was disconnected from the barrage...

Read more
Dual Critical Advisory: Critical Vulnerabilities in Veeam Backup & Replication and SonicWall SonicOS

Dual Critical Advisory: Critical Vulnerabilities in Veeam Backup & Replication and SonicWall SonicOS

Veeam Backup & Replication: Critical Patches for Vulnerabilities Overview: Veeam released patches for 13...

Read more
New Qilin Ransomware Attack

New Qilin Ransomware Attack

A new strain of ransomware, dubbed Qilin, is targeting VPN networks with stolen or harvested credentials. ...

Read more
NPD Breach Exposes 3 Billion Personal Records

NPD Breach Exposes 3 Billion Personal Records

10-21-2024 Update: Thanks to Security Now's Podcast, Steve Gibson and Leo Laporte, we now have a...

Read more
Understanding the CrowdStrike Global Outage

Understanding the CrowdStrike Global Outage

On Fri. July 19th, CrowdStrike, a leading provider of Endpoint Detection and Response services, caused the...

Read more
Cybersecurity Perspective on the Ticketmaster-Taylor Swift Incident

Cybersecurity Perspective on the Ticketmaster-Taylor Swift Incident

Ticketmaster, the undisputed giant of event ticketing, recently found itself at the center of a unique...

Read more
Critical Advisory: OpenSSH Remote Code Execution Vulnerability

Critical Advisory: OpenSSH Remote Code Execution Vulnerability

What Happened?A critical vulnerability, tracked as CVE-2023-38408, has been discovered in...

Read more
Advisory: Protecting Yourself After the Ticketmaster Data Breach

Advisory: Protecting Yourself After the Ticketmaster Data Breach

May 30th, 2024: Recent news highlighted a significant breach at Ticketmaster, affecting 560...

Read more
Ransomware Defense: Protection from Remote Access Risks

Ransomware Defense: Protection from Remote Access Risks

Ransomware Risks from Remote Access ToolsHackers are constantly evolving their tactics and...

Read more
Protecting Your Data: Lessons from the “Dropbox Sign” API and OAuth Breach

Protecting Your Data: Lessons from the “Dropbox Sign” API and OAuth Breach

Safeguarding Against API Key and OAuth Token TheftOne of the risks of using an expanding cadre of...

Read more
Testimonials

See who's talking about Cyberhoot

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer