"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Lessons Learned from the Change Healthcare BreachA recent cyberattack has put "a substantial...
Read more
Threat Intelligence Summary: Suspected nation-state actors have launched attacks on Cisco firewalls in a campaign...
Read more
Understanding, Defending, and Defeating a Stealthy Cyber ThreatIn today's ever-changing world of...
Read more
Mega-Breach Introduction:In the ever-evolving landscape of cybersecurity, the emergence of data...
Read more
CyberHoot recently blogged about scams involving peer-to-peer payment apps. Hackers impersonate family members...
Read more
Zelle payment scams are surging in this peer-to-peer payment service. These financial scams employ social...
Read more
The Rise (again) of Malicious Advertisements In the constantly evolving landscape of cybersecurity threats,...
Read more
October 27th, 2023, 4:15pm: CyberHoot has just learned of multiple vulnerabilities (documented...
Read more
September 27th, 2023: CyberHoot has learned of a critical vulnerability in Googles graphics file...
Read more
EvilProxy malware bypasses MFA to take over victims email account. Aug. 29th...
Read more
Trojan Horse Malware Delivery via Micrsoft Teams June 29th, 2023 - Microsoft...
Read more
Attack Introduction:This article sheds light on a very old attack method hackers have used that...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.
