Blog > Page 25

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Emotet Operation Takedown

Emotet Operation Takedown

In January of 2021, law enforcement and judicial authorities across the globe disrupted one of the most...

Read more
Security Advisory – Apple and Linux/Unix

Security Advisory – Apple and Linux/Unix

February 1st, 2021 Update: All Apple MacOS products are also at risk for the sudo privilege escalation...

Read more
WordPress Site Risks

WordPress Site Risks

WordPress websites account for more than one-third of all websites on the Internet. WordPress is both...

Read more
Ubiquiti Security Breach

Ubiquiti Security Breach

Ubiquiti, a large vendor of cloud-enabled Internet of Things (IoT) devices such as Wi-Fi Access Points,...

Read more
Chrome Extension Privacy Concerns

Chrome Extension Privacy Concerns

Browser extensions are tools that help with spelling/grammar, finding deals, storing passwords, or...

Read more
PayPal Smishing Attack

PayPal Smishing Attack

A PayPal text message phishing campaign was discovered that attempts to steal your account credentials...

Read more
Ransomware Task Force Forming

Ransomware Task Force Forming

The damaging effects of ransomware hit $11.5 billion in 2019, and doubled in 2020 as new, more damaging...

Read more
IRS Impersonation Attack

IRS Impersonation Attack

Fake IRS Tax Forms This week, AbnormalSecurity reported an attack on an estimated 15-50 thousand email...

Read more
IRS Pin Protection in 2021

IRS Pin Protection in 2021

The Internal Revenue Service (IRS) announced this week that in January 2021 taxpayers can apply for an...

Read more
Close Proximity iPhone Hack

Close Proximity iPhone Hack

Google's Project Zero cybersecurity researcher (and white-hat hacker) Ian Beer published an article in...

Read more
‘Smart’ Doorbell Vulnerabilities

‘Smart’ Doorbell Vulnerabilities

The holiday season is officially upon us. Now is a good time to find great deals but proceed with caution: be...

Read more
HTTPS-Only Mode Introduced by Firefox

HTTPS-Only Mode Introduced by Firefox

For those that don't know, the webpage you're reading this article on features the security protocol of...

Read more
Testimonials

See who's talking about Cyberhoot

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director