shark tank host phishing attack

Shark Tank Host Phished For Nearly $400K

Barbara Corcoran, a world famous Shark Tank host, was scammed out of nearly $400,000 in late February. Barbara Corcoran, a renowned real-estate broker and business expert, admitted last month that …

coronavirus remote work security article

Stay Secure While Working Remotely

Working remote introduces many new cybersecurity risks to businesses large and small. Review the best practices, watch a few videos, and prepare your business for success in the new era of COVID19 and working remote.

Coronavirus Advisory

Last Updated: Sun. March 8th, 2020 The Coronavirus (COVID-19), has infected nearly 90,000 people worldwide as of March 2, 2020, killing more than 3,000 of those infected. The virus started …

Jeff Bezos and the WhatsApp Security Flaw

Knowing how to protect yourself and your critical accounts from compromise is becoming ever more important. Learn what can happened to and setup 2FA into all of your online critical accounts.

coronavirus cybersecurity scam ftc

FTC Warns of Potential Coronavirus Scams

The Coronavirus has been on the front of everyone’s mind lately, causing fear and concern across the world. This deadly virus opens up yet another way for attackers to hack …

Hack Back Bill

The Active Cyber Defense Certainty Act (ACDC), also known as the “Hack Back” bill was first introduced in the U.S. House of Representatives in 2017. The bill has been worked …

SIM Swapping by Hacking Telecom Companies

Hackers never cease to stop evolving and finding new ways to get your information. Hackers are now breaking into telecom companies to take over victim’s phone numbers. Being able to …

Critical Microsoft Vulnerabilities

Infrequently, Microsoft released critical vulnerability alerts and patches that are so important to know about, that you should stop what you’re doing and review them and plan to patch as soon as possible. This is one of those times.

Ransomware attack in Richmond Michigan Schools

Michigan School District Shut Down by Ransomware

Educational institutions are easy marks for hackers peddling ransomware. They have lots of critical student and employee data, small cybersecurity budgets, and don’t train students or faculty how to spot and avoid common cyber-attacks. Combined with an ability to pay ransoms either through cyber-insurance coverage or city coffers, and they have a perfect cyberattacks bullseye on them!

5 Password Manager Myths

The Internet is racing towards 10 Billion publicly documented breached accounts. You can check your own email accounts for breaches and what information was compromised through CyberHoot’s website, inside your …

DeepFakes

Deepfakes: Hackers Newest Trick

Technology is always improving and hackers are always finding novel ways to exploit those advances. Cyber security analysts believe new attacks are on the way next year with some powerful …

RYUK Ransomware infects 110 Healthcare Facilities

This past Thanksgiving weekend, 110 healthcare facilities were infected by a ransomware attack on their IT provider. Virtual Care Provider Inc. (VCPI), provides security, data hosting and access management services …

Watch out for Cyber Monday Phishing Scams

Who is most likely to fall victim to Cyber Monday phishing scams? People who don’t know about phishing scams, typosquatting, and fake look-alike websites. Did you know there are 4 …

BlueKeep is MS Blaster

Good backups will let you go back in time to recover compromised systems. Don’t let this happen by not patching for BlueKeep now.

Google Chrome Zero Day in the Wild

CyberHoot has learned there is a new Zero-Day vulnerability in Chrome actively being exploited in the Wild. Your computer can be compromised just by visiting a malicious website. That is …

3.5 Million Unfilled Cybersecurity Jobs by 2021

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

Apple Gift Card Email Compromise

The picture above is a bag with $25,000 in “redeemed” Apple Store gift cards sent to hackers overseas by a small business in New England. The business owner’s email address …

What is Business Email Compromise?

Enterprise Security Weekly Podcast

Employees are the weakest link in Cybersecurity and because of this 80% of businesses will adopt a Cloud-based training solution by 2020. Small to Medium sized businesses are being left …

The Importance of Social Media and Email Security

HB 1612 : DATA SECURITY IN NH PUBLIC SCHOOLS

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

Our Employees Deserve Security Training

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

Join Our Newsletter

NCAM CyberHoot: Business E-mail Compromise

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

NCAM CyberHoot: Passwords & Password Managers

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

CyberHoot – Two-Factor Authentication – What is it and why is it Important?

NCAM CyberHoot: Two-Factor Authentication

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

Learning the dangers of public wifi networks

NCAM CyberHoot: Reduce WiFi Risks

October is National CyberSecurity Awareness Month (NCSAM). It is a collaborative effort between government and industry to raise awareness about the importance of cybersecurity. CyberHoot is helping further the mission …

Phishing and Spear Phishing Explained

This video explains the common form of phishing simply called phishing.  It then goes on to differentiate a more sophisticated, targeted and well-researched attack on businesses known as a Spear-Phishing …

Smartphones Targeted by Drive-by Malware

Cyber “Events” that Shape History Only a few events in the history of “Cyber” and “Security” cause security professionals sit back, meditate, and try to understand the implications of that event.  …

SMB’s Attacked 15x More Often

Small to Medium-sized Businesses (SMB’s) are attacked fifteen times more often than smaller firms (>10 employees) and larger firms (<100 employees).  In 2018 they accounted for 43% of all security …

QR Code Scams

The latest way hackers are breaching your private information is by using malicious Quick Response codes, more commonly referred to as a QR Code. QR codes were first created back …

Three Tips for the Digital Age

CyberHoot received notice today that our Café Press account had been breached along with 23 million other accounts. Fortunately, no password data was reported stolen. However, phone numbers, home addresses, …

Capital One Breach Affects Over 100M

On July 29, Capital One announced it experienced a data breach affecting over 100 million customers. While that is an enormous number it represents only 1.4% of nearly 8 billion …

Microsoft Bug “BlueKeep” May Affect Millions

Overview: On May 14, Microsoft issued a software update patch for its Remote Desktop Protocol (RDP). These patches fixed RDP vulnerabilities in older Windows operating systems including Windows Server 2008, …