Blog > Page 5

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
CyberHoot Newsletter – February 2025

CyberHoot Newsletter – February 2025

Welcome to CyberHoot's February Newsletter!This month, we’re diving into some critical...

Read more
USPS Text Scam: Cybercriminals Hiding Malicious PDFs

USPS Text Scam: Cybercriminals Hiding Malicious PDFs

In the ever-evolving landscape of cybercrime, scammers are constantly finding innovative ways to...

Read more
U.S Navy Limits DeepSeek AI Over Cybersecurity Concerns

U.S Navy Limits DeepSeek AI Over Cybersecurity Concerns

Three weeks ago a new AI service came to market called DeepSeek.  Competing with US AI startup...

Read more
The Importance of Encrypted Apps in Today’s Cybersecurity Landscape

The Importance of Encrypted Apps in Today’s Cybersecurity Landscape

As Nation-State cyberattacks become increasingly sophisticated and widespread, U.S. officials are urging...

Read more
Critical Advisory: FortiGate SSL VPN Breach

Critical Advisory: FortiGate SSL VPN Breach

Incident Overview A significant breach affecting FortiGate’s SSL VPNs has exposed vulnerabilities in nearly all...

Read more
Beware of FireScam: Malware Masquerading as Telegram

Beware of FireScam: Malware Masquerading as Telegram

In a disturbing development for Android users, cybersecurity experts have uncovered a new malware campaign known...

Read more
CyberHoot Newsletter – January 2025

CyberHoot Newsletter – January 2025

Welcome to CyberHoot’s January Newsletter!Happy New Year!Kick off the new year by staying...

Read more
New DoubleClickjacking Exploit: What It Is and How to Stay Protected

New DoubleClickjacking Exploit: What It Is and How to Stay Protected

Cybercriminals are constantly evolving their tactics, and a new exploit called DoubleClickJacking has emerged,...

Read more
How to Keep Your Text Messages Secure in an Era of Rising Cyber Threats

How to Keep Your Text Messages Secure in an Era of Rising Cyber Threats

Text messaging has become an integral part of modern communication, from personal chats to sharing sensitive...

Read more
Critical Advisory: Google Chrome Extensions Hacked

Critical Advisory: Google Chrome Extensions Hacked

In a stark reminder of the ever-evolving threats in cyberspace, multiple popular Google Chrome extensions have...

Read more
Beware of Brushing Scams: A Hidden Threat to Shoppers

Beware of Brushing Scams: A Hidden Threat to Shoppers

As online shopping surges during holidays and sales events, cybercriminals are finding creative...

Read more
Microsoft’s Authquake MFA Flaw

Microsoft’s Authquake MFA Flaw

Multi-Factor Authentication (MFA) is a cornerstone of cybersecurity. It adds an extra layer of protection to...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President