Blog

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Attackers Don’t Need a Key. They Already Have Yours.

Attackers Don’t Need a Key. They Already Have Yours.

Most breaches don't start with a hacker in a hoodie cracking code at 3am. They start with your username and a...

Read more
Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Claude Mythos Opened Pandora’s Box. Project Glasswing Is Racing to Close It.

Article Updates: As of May 6th 2026, every major U.S. AI lab, including Google DeepMind, Microsoft, xAI,...

Read more
When the “CEO” Calls and Asks You to Move Money Fast

When the “CEO” Calls and Asks You to Move Money Fast

A guide to spotting senior executive impersonation scams before the fake CEO gets a real wire transfer. It...

Read more
When the Attack Looks Just Like You

When the Attack Looks Just Like You

Artificial Intelligence (or AI) is making phishing emails smarter, malware sneakier, and credential theft easier...

Read more
Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

Cybercriminals Are Exploiting DocuSign with Customizable Phishing Templates

DocuSign has become one of the most trusted tools in modern business. Contracts, HR paperwork, NDAs, vendor...

Read more
PromptSpy: The Android Malware That Hired an AI Assistant

PromptSpy: The Android Malware That Hired an AI Assistant

And yes, Google's Gemini AI had no idea it was working for the bad guys. Malware has always followed a script....

Read more
Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware Entry Points are Changing. Here Is What to Do About It?

Ransomware groups are not breaking in organizations the same way they did five years ago. The entry methods have...

Read more
Malicious Chrome Extension Disguised as  a Business Tools

Malicious Chrome Extension Disguised as a Business Tools

If a Chrome extension promises to remove security pop-ups and generate MFA codes, that should make you...

Read more
Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Sneaky Browser Extensions Are Hijacking ChatGPT Sessions

Cyberattacks usually start with phishing emails or weak passwords. This one did not. Security researchers...

Read more
Cybersecurity Leader Uploads Sensitive Files to AI

Cybersecurity Leader Uploads Sensitive Files to AI

Not surprising when Trouble Ensues Last summer, the interim head of a major U.S. cybersecurity agency uploaded...

Read more
Common Google Workspace Security Gaps

Common Google Workspace Security Gaps

And How to Fix Them Let me make an educated guess. You moved to Google Workspace because it was supposed to...

Read more
MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...

Read more
Testimonials

See who's talking about Cyberhoot

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
Thanks to CyberHoot, we were able to offer our customers an engaging and effective awareness training program. Our first customer who saw it was impressed, which speaks volume
Oscar Nunez, DSI, IT Solutions Architect
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
Robyn Dunlap, Franklin Schools, Director of Technology