Blog > Page 3

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Make Phishing Training Count with HootPhish

Make Phishing Training Count with HootPhish

Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...

Read more
Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

Apple Alert: Critical AirPlay Vulnerabilities Expose Millions to Cyber Threats

A recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...

Read more
CyberHoot Newsletter – May 2025

CyberHoot Newsletter – May 2025

Welcome to CyberHoot's May Newsletter! This month, we're spotlighting key developments in the cyber threat...

Read more
Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

Cybersecurity Advisory: Hackers Exploit Zoom’s Remote Control Feature

A newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...

Read more
Bolstering HR Security Processes to Counter Fraudulent Worker Scams

Bolstering HR Security Processes to Counter Fraudulent Worker Scams

Recent reports have exposed sophisticated schemes where fraudulent technology workers, often using fake...

Read more
Malvertising Alert: Phishing Campaign Targets Onfido Users via Google Ads

Malvertising Alert: Phishing Campaign Targets Onfido Users via Google Ads

In April 2025, cybersecurity firm Push Security uncovered a sophisticated malvertising campaign targeting Onfido...

Read more
CyberHoot Newsletter – April 2025

CyberHoot Newsletter – April 2025

Welcome to CyberHoot's April Newsletter! Spring may be in full bloom, but in the digital world, threat actors...

Read more
Division of Labor in Criminal Enterprises leads to High-Volume, Low-Cost Attacks

Division of Labor in Criminal Enterprises leads to High-Volume, Low-Cost Attacks

Henry Ford revolutionized automobile manufacturing a century ago by dividing complex assembly tasks into...

Read more
Tax Season Scams: Microsoft Warns of Phishing Attacks

Tax Season Scams: Microsoft Warns of Phishing Attacks

 As the April 15 U.S. Tax Day approaches, cybercriminals are intensifying their efforts to...

Read more
Top 3 Microsoft Office Exploits Hackers Are Using in 2025—and How to Stop Them

Top 3 Microsoft Office Exploits Hackers Are Using in 2025—and How to Stop Them

​In 2025, hackers continue to exploit office files, making them a top attack vector for cybercrime....

Read more
Medusa Ransomware Deploys Malicious Driver to Evade Security

Medusa Ransomware Deploys Malicious Driver to Evade Security

As ransomware threats go, the Medusa ransomware group has a lengthy and notorious history of successfully...

Read more
CyberHoot Newsletter – March 2025

CyberHoot Newsletter – March 2025

Welcome to CyberHoot's March Newsletter!As cyber threats continue to evolve, staying informed...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"I reviewed over a dozen learning management platforms, and I have to say, CyberHoot is soaring way above the others."
Nick Marteney, MotherBear Security, Co-Founder & CEO
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director