Blog

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
184 Million Passwords Leaked: Is Your Digital Doppelgänger Out There?

184 Million Passwords Leaked: Is Your Digital Doppelgänger Out There?

Spoiler alert: If you’re still using “password123” or “iloveyou” for your login… it’s time for an...

Read more
CyberHoot Newsletter – June 2025

CyberHoot Newsletter – June 2025

CyberHoot June Newsletter: Stay Informed, Stay Secure Welcome to the June edition of CyberHoot’s newsletter,...

Read more
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more
CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more
Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

A newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...

Read more
Bolstering HR Security Processes to Counter Fraudulent Worker Scams

Bolstering HR Security Processes to Counter Fraudulent Worker Scams

Recent reports have exposed sophisticated schemes where fraudulent technology workers, often using fake...

Read more
Malvertising Alert: Phishing Campaign Targets Onfido Users via Google Ads

Malvertising Alert: Phishing Campaign Targets Onfido Users via Google Ads

In April 2025, cybersecurity firm Push Security uncovered a sophisticated malvertising campaign targeting Onfido...

Read more
CyberHoot Newsletter – April 2025

CyberHoot Newsletter – April 2025

Welcome to CyberHoot's April Newsletter! Spring may be in full bloom, but in the digital world, threat actors...

Read more
Division of Labor in Criminal Enterprises leads to High-Volume, Low-Cost Attacks

Division of Labor in Criminal Enterprises leads to High-Volume, Low-Cost Attacks

Henry Ford revolutionized automobile manufacturing a century ago by dividing complex assembly tasks into...

Read more
Tax Season Scams: Microsoft Warns of Phishing Attacks

Tax Season Scams: Microsoft Warns of Phishing Attacks

 As the April 15 U.S. Tax Day approaches, cybercriminals are intensifying their efforts to...

Read more
Top 3 Microsoft Office Exploits Hackers Are Using in 2025—and How to Stop Them

Top 3 Microsoft Office Exploits Hackers Are Using in 2025—and How to Stop Them

​In 2025, hackers continue to exploit office files, making them a top attack vector for cybercrime....

Read more
Testimonials

See who's talking about Cyberhoot

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President