gandcrab ransomware

GandCrab Ransomware

Increasingly sophisticated and damaging ransomware attacks are here. Availability has always been threatened, but backups prevented ransoms from being paid so hackers have added confidentiality attacks. Ransomware like Maze and REvil now threaten to release critical data online if a ransom isn’t paid. Visit Cyberhoot to learn how to protect from this evolution and escalation in the ransomware war with hackers.

August 11th, 2020

garmin ransomware attack

Garmin Ransomware Attack

Garmin, like Twitter the week before, suffered a massive breach. For Garmin it was ransomware while Twitter saw 130 of its most influential accounts taken over by hackers. Both companies suffered at the hands of hackers who used social engineering attacks to get into the companies and cause their damage. Visit CyberHoot to learn how to protect yourself and your company from these attacks.

August 4th, 2020

diebold atm hack

Jackpotting: Asian ATM Hacking Reaches the US

Automated Teller Machines (ATMs) have been around for more than 50 years. In that time, criminals have found many unique ways to steal the cash they contain. Physical security, network security, logical security all play roles in protecting these machines from compromise. Learn how banks are protecting the machines and what you can learn from ATM heists to protect your own business at CyberHoot.

July 28th, 2020

msp attack increases

U.S.S.S. Reporting Increase In Hacked MSPs

The Secret Service warned of increasing attacks on MSPs in July 2020. If you’re not learning how to protect yourself as a Next Generation MSP, then you’re going to be compromised and you’re going to be out of business in the future. The risks are too great. You need to become more aware to become more secure. Learn how to do all this with CyberHoot.

July 21st, 2020

twitter hacked

Major Twitter Accounts Hacked

July 15, 2020: Hundreds of high-profile twitter accounts were hacked including Elon Musk, Kanye West, Barack Obama, Bill Gates, and many others. They all posted nearly identical messages asking for …

July 16th, 2020

SIGRed is not your run of the mill vulnerability.

SIGRed – All Windows Servers Running DNS Critical Vulnerability

Every so often, a vulnerability is discovered so egregious that its discovery warrants a special name. On July 14th 2020, a new vulnerability named “SIGRed” was announced that could lead to the compromise of ALL Windows servers from a simple email phishing attack containing a specially-crafted DNS query that would yield complete hacker control of impacted servers. Now that I have your attention, stop what you were planning to do, and read up on SIGRed and apply the Patch of the Registry work-around NOW.

July 15th, 2020

pet adoption scams

Hacker’s Latest Scam: Pet Adoptions

Cyber criminals capitalize on global events (COVID) and national trends that result from global events (Pet Adoption increases). CyberHoot is seeing an increase in Pet Adoption Scams and wants to help our users become more aware of how to spot these scams and avoid them. Become more aware to become more secure.

July 14th, 2020

tattoo recognition software

Social Media Used To Catch Violent Protester

Social media video was used to identify and apprehend a violent protester in Philidelphia. Our images and identity markers are being documented everywhere we go and our privacy is being bottled up in countless databases across the world, boiled down to a digital fingerprints, and used by law enforcement and others if the data is breached and stolen. Are the right protections in place to protect our 4th amendment rights? With great power comes great responsibility. It also requires great cybersecurity protection which CyberHoot is not convinced exists to keep these digital fingerprints safe and protected from misuse.

July 7th, 2020

mac malware article

Malware in Macs

MAC Malware has grown faster than Windows Malware in the last 24 months. If you bought a MAC because it was “safer” think again and learn all the types of malware that’s impacting these systems. Become more aware to become more secure especially with respect to MAC hardware.

June 30th, 2020

Hackers Are Releasing Fake Contact Tracing Apps

Hackers are constantly adapting to the changing realities of today’s global pandemic. Their latest attack method is the release of bogus contact tracing applications. Twelve (12) country’s have had fake contract tracing apps released by hackers impersonating their government contact tracing programs in order to compromise citizen’s mobile devices. Learn how to protect yourself in this article.

June 23rd, 2020

stalkerware cybersecurity

Stalkerware Could Be Spying On You

In this day and age, the ability to track someone with their mobile devices is incredibly easy. It’s made easier still using automated tools like stalkerware available online from the dark web. Learn how to protect yourself and your devices at CyberHoot.com.

June 16th, 2020

youtube blog

YouTubers: The Growing Security Target

YouTube Influencers make a good deal of money and are being targeted for account hi-jacking by hackers seeking to extort them for bitcoin ransom payments. Pay or lose your followers/subscribers when the hacker posts offensive materials alienating subscribers.

June 9th, 2020

phish testing employees

Phish Testing Employees

Phishing attacks represent 90% of successful breaches at Small to Medium Sized Businesses (SMBs). Learn what they are and how to protect yourself from them at CyberHoot.com.

June 2nd, 2020

owasp top ten

OWASP Top Ten

Development shops need to practice safe and secure coding. The best way to get your developers all on the same page is to train them in the Top 10 most common security mistakes made in coding. Visit CyberHoot.com’s blog article here on OWASP Top 10 coding errors that lead to insecure applications.

May 26th, 2020

ccpa gdpr privacy act laws

Regulations Like the CCPA Don't Stop at California

Data Privacy legislation has received some heavy support from the European Union with the passing of the General Data Privacy Regulations (GDPR) followed by California’s Consumer Protection Act (CCPA). Additional states are looking to bring a patchwork quilt of privacy requirements to the US in concert and conflict with one another. Learn more here at CyberHoot.

May 19th, 2020

Internet of Things (IoT)

The Internet of Things (IoT) is any device or machine that has the ability to transfer data over a network without requiring human-to-human or human-to-computer interaction. IoT is essentially any …

May 12th, 2020

MAZE Ransomware: 3x Threat to Data Security

MAZE Ransomware represents a change for the worse in the capabilities of online hackers today. Traditional backup strategies are no longer enough to provide a get-out-of-jail-free card when hit with ransomware. Data confidentiality is also at risk now and that changes who will pay ransoms dramatically. Prepare now to avoid this scourge of online hacking.

April 28th, 2020

cmmc cyber security

The New CMMC Standard

Cybersecurity Maturity Model Certification is a much needed adjustment to DFARS that provides risk based compliance to five levels of controls that relates to the Controlled Unclassified Information (CUI) that underpins a defense contractor, sub or prime working in the defense industry.

April 21st, 2020

MSPs Should Require Risk Assessments

Risk assessments have many benefits and only one drawback (they cost money). Having a Risk Management framework in place requires a risk assessment be performed. Avoid costly down-time and improve network robustness by having one done on your business.

April 14th, 2020

Attacks on Mobile Devices Increasing

In 2020, the number of daily smartphone users in the world totals 3.5 Billion or 45% of the world’s population. However, the total number of people who own a smart or …

April 7th, 2020

zoom bombing coronavirus hackers

Zoom Bombing

Zoom Bombing is where an unauthorized person enters your Zoom video conference to cause disruptions or to gain sensitive information. Many companies and schools have begun using video conferencing extensively …

April 1st, 2020

shark tank host phishing attack

Shark Tank Host Phished For Nearly $400K

Barbara Corcoran, a world famous Shark Tank host, was scammed out of nearly $400,000 in late February. Barbara Corcoran, a renowned real-estate broker and business expert, admitted last month that …

March 31st, 2020

coronavirus remote work security article

Stay Secure While Working Remotely

Working remote introduces many new cybersecurity risks to businesses large and small. Review the best practices, watch a few videos, and prepare your business for success in the new era of COVID19 and working remote.

March 24th, 2020

Coronavirus Advisory

Last Updated: Sun. March 8th, 2020 The Coronavirus (COVID-19), has infected nearly 90,000 people worldwide as of March 2, 2020, killing more than 3,000 of those infected. The virus started …

March 3rd, 2020

Jeff Bezos and the WhatsApp Security Flaw

Knowing how to protect yourself and your critical accounts from compromise is becoming ever more important. Learn what can happened to and setup 2FA into all of your online critical accounts.

February 25th, 2020

coronavirus cybersecurity scam ftc

FTC Warns of Potential Coronavirus Scams

The Coronavirus has been on the front of everyone’s mind lately, causing fear and concern across the world. This deadly virus opens up yet another way for attackers to hack …

February 18th, 2020

Hack Back Bill

The Active Cyber Defense Certainty Act (ACDC), also known as the “Hack Back” bill was first introduced in the U.S. House of Representatives in 2017. The bill has been worked …

February 11th, 2020

SIM Swapping by Hacking Telecom Companies

Hackers never cease to stop evolving and finding new ways to get your information. Hackers are now breaking into telecom companies to take over victim’s phone numbers. Being able to …

January 21st, 2020

Critical Microsoft Vulnerabilities

Infrequently, Microsoft released critical vulnerability alerts and patches that are so important to know about, that you should stop what you’re doing and review them and plan to patch as soon as possible. This is one of those times.

January 14th, 2020

cyber attack iran potential

DHS Warns of Potential Cyber Attacks from Iran

With tensions cooling ever so slightly from the days following Suleimani’s killing, the threat of Cyberattack by Iranian hackers remains a very real threat. Vigilance is still key.

January 14th, 2020

Ransomware attack in Richmond Michigan Schools

Michigan School District Shut Down by Ransomware – Why Educational Institutions are Prime Targets

Educational institutions are easy marks for hackers peddling ransomware. They have lots of critical student and employee data, small cybersecurity budgets, and don’t train students or faculty how to spot and avoid common cyber-attacks. Combined with an ability to pay ransoms either through cyber-insurance coverage or city coffers, and they have a perfect cyberattacks bullseye on them!

January 3rd, 2020

5 Password Manager Myths

The Internet is racing towards 10 Billion publicly documented breached accounts. You can check your own email accounts for breaches and what information was compromised through CyberHoot’s website, inside your …

December 26th, 2019

DeepFakes

Deepfakes: Hackers Newest Trick

Technology is always improving and hackers are always finding novel ways to exploit those advances. Cyber security analysts believe new attacks are on the way next year with some powerful …

December 10th, 2019

RYUK Ransomware infects 110 Healthcare Facilities

This past Thanksgiving weekend, 110 healthcare facilities were infected by a ransomware attack on their IT provider. Virtual Care Provider Inc. (VCPI), provides security, data hosting and access management services …

December 3rd, 2019