Blog > Page 24

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Ransomware Shuts Down Largest U.S. Pipeline

Ransomware Shuts Down Largest U.S. Pipeline

The United States' largest pipeline, Colonial Pipeline, halted operations due to a ransomware attack. Colonial...

Read more
Apple Zero-Day – Cybersecurity Advisory

Apple Zero-Day – Cybersecurity Advisory

May 4th, 2021: Apple has released IOS updates for 4 critical issues that impact all Mac, iOS, iPad, and...

Read more
Apple AirDrop Vulnerability

Apple AirDrop Vulnerability

Security researchers in Germany have put out a press release about research findings to be presented at...

Read more
What Was 2020’s Most Expensive Cybercrime?

What Was 2020’s Most Expensive Cybercrime?

It's apparent that ransomware and its evolution into leakware is a critical threat to most businesses...

Read more
Israel Launches ‘Stuxnet 3.0’ On Iran

Israel Launches ‘Stuxnet 3.0’ On Iran

Iran announced that a blackout occurred at its uranium enrichment facility in Natanz. Iran blamed...

Read more
Booking.com Fined Following Vishing Attack

Booking.com Fined Following Vishing Attack

Summary Message: Working out your Breach Notification during a Breach is a recipe for disaster. Back in...

Read more
Facebook Exploit – Cybersecurity Advisory

Facebook Exploit – Cybersecurity Advisory

April 2021: CyberHoot received notification of a hacking forum publishing the stolen phone numbers and...

Read more
UK Census Smishing Attack

UK Census Smishing Attack

As many know, the United States had its decennial (every ten years) census in 2020, helping determine...

Read more
Instagram Scams: How To Avoid Them

Instagram Scams: How To Avoid Them

Since Instagram's official launch in 2010, it's seen more than 1 billion accounts opened with users...

Read more
Twitter Steganography Risks

Twitter Steganography Risks

Steganography is the interesting but potentially dangerous technique of hiding data or malware code...

Read more
Why NFTs Are The Future

Why NFTs Are The Future

The popular musician Grimes sold some animations she made with her brother Mac on a website called 'Nifty...

Read more
US Treasury Bans Ransomware Payments

US Treasury Bans Ransomware Payments

Oct.1st, 2020: The US Treasury Department's Office of Foreign Assets Control (OFAC) warned...

Read more
Testimonials

See who's talking about Cyberhoot

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."

Tim Ward, Goodwill of Chattanooga, Director, Information Technology

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator