CyberHoot Newsletter – December 2024
This newsletter summarizes cybersecurity news from December, and boy there are some big events that happened.
Monthly newsletters showing the month’s articles that were written, cybrary term of the month, customer reviews, announcements, etc.
This newsletter summarizes cybersecurity news from December, and boy there are some big events that happened.
This newsletter summarizes cybersecurity news from November, and boy there are some big events that happened.
This newsletter summarizes cybersecurity news from October, and boy there are some big events that happened.
This newsletter summarizes cybersecurity news from August, and boy there are some big events that happened.
This newsletter summarizes cybersecurity news from June and July, and boy there are some big events that happened. From CrowdStrike’s global outage to increased focus on credential stuffing attacks, hackers were hard at work during this period.
Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies Time-Intensive Mobile Hacks: Discover how time-intensive mobile hacks are evolving and what companies can do to protect themselves from these sophisticated …
Understanding the Change Healthcare Cyberattack Change Healthcare Cyberattack: Gain valuable insights into the attack’s origins, impact, and implications for your cybersecurity. Read now. Understanding Latrodectus: A Stealthy Cyber Threat Delve into …
“CyberHoot’s Newsletter has been on a brief hiatus as we focused on critical product improvements, finished 2024 strategic planning, and addressed performance improvements. This newsletter is chock full of cyber …
Navigating the Cybersecurity Risks of AI Assistants in Video Conferencing Silent Eavesdroppers: As AI Digital Assistants seamlessly integrate into popular video conferencing platforms, a concerning trade-off emerges between convenience and …
Understanding and Protecting Against Telegram App Scams Unraveling the Dark Side of Telegram: While the messaging app offers a seamless communication experience, users face many dangers. Dive into this article …
The SEC has Strengthened Cybersecurity Reporting Requirements – What you Need to Know Over the last two years, the SEC has enhanced cybersecurity disclosure rules for publicly traded companies. Learn …
Top 5 Emerging Cybersecurity Threats Businesses Must Be Aware Of Cybersecurity threats continue to evolve in sophistication and impact. Businesses must address these top 5 emerging threats proactively instead of …
Protecting Your Business and Family from DeepFake Attacks: A Comprehensive Guide Unmasking the Dark Reality: FBI Discovers Surge in Deep Fake Attacks, Threatening Individuals and Businesses with Extortion and Humiliation. …
Voice Cloning is Becoming a Ransom Threat Are you confident that the voice on the other end of the line is who they claim to be? Voice impersonation, powered by …
ChatGPT Authors a Humorous Cyber Breach Article Relating to T-Mobile CyberHoot examined ChatGPT ourselves and asked it to write a humorous article about a large Mobile Carrier breach. Despite common …
FBI’s Vetted Cybersecurity Organization “Infragard” Breached Learn how a cybersecurity organization that partnered with the Federal Bureau of Investigation (FBI) to protect critical US infrastructure got hacked. “Aikido” Vulnerability Turns EDR …
Top 10 Reasons to Conduct Awareness Training and Testing Businesses all over the world experience increasingly sophisticated attacks with escalating damages and impact. Awareness training and phish testing are two …
Remote Worker Security and Productivity The 2020 Coronavirus pandemic has lead many workers to work from home to slow its spread. As we move into a third wave of infections, …
Restaurant Cloud-based POS Systems Hacked Multiple POS systems used by restaurants all over the world (MenuDrive, HarborTouch, and InTouchPOS) have been hacked enabling hackers to collect credit card details on …
Ransomware Insurance: Prescriptive and Restrictive Insurers are drafting more restrictive and prescriptive insurance policy requirements designed to reduce the number of claims and better protect themselves and the companies they …
Emotet Has Reemerged as Top Malware in Circulation The HP Wolf Security threat research team has identified a 2700% increase in Emotet infections in the first quarter of 2022, re-emerging in late 2021 after …
Fake Emergency Search Warrants Becoming a Problem There is a new and highly effective strategy that criminal hackers are using to gather sensitive customer data from Internet Service Providers (ISPs), …
Post-Breach Notification Guide If you’ve confirmed a significant data breach has occurred you may be wondering what you should be doing. CyberHoot’s guide will help your company work through the …
Increase MRR While Reducing Costs At Your MSP An important part of running a successful Managed Service Provider (MSP) is ensuring you’re managing your monthly recurring revenue (MRR) and your expenses. One …
Software as a Service (SaaS) Risks and Challenges Software as a Service (SaaS) applications have transformed businesses over the last decade providing enormous value. SaaS solutions have enabled businesses to …
‘Tis The Season To Be Smished The holiday shopping season means big business for retailers around the world, but it unfortunately also means big business for hackers. The reasoning is, people …
Outlook “Autodiscover” Leaking Passwords Cybersecurity experts at Guardicore published a report on security concerns in Microsoft’s “Autodiscover” feature. In 4 months time, they collected over 372,072 domain credentials and ~100k in …
Pegasus Spyware NSO, an Israeli company has been selling governments spyware surveillance tools. National Public Radio, detailed this spyware, called Pegasus, allowing governments (hackers?) to access a victim’s cellphone to …
Prevention Absent: Congress Cybersecurity Bill Highly publicized ransomware breaches at Colonial Pipeline and JBS meats has congress seeking new federal legislation aimed at forcing government agencies, subcontractors, and suppliers to …
Israel Launches ‘Stuxnet 3.0’ On Iran Iran blamed Israel for an alleged cyber-attack on its underground Natanz nuclear facility that damaged its centrifuges. While the Israeli government did not claim …
Twitter Steganography Risks Steganography is the interesting but potentially dangerous technique of hiding data or malware code secretly within an ordinary, non-secret file or message to avoid detection. The use of …
Emotet Operation Takedown In January of 2021, law enforcement and judicial authorities across the globe disrupted one of the most notable botnets of the past decade: Emotet. Investigators have taken control of its …
Ransomware Task Force Forming The damaging effects of ransomware hit $11.5 billion in 2019 and doubled in 2020 as new, more damaging and dangerous strains of ransomware (Maze, Sodinokibi, Ryuk, Dharma) hit companies. In December 2020, …
HTTPS-Only Mode Introduced by Firefox Having HTTPS-enabled websites is crucial when entering passwords, credit card numbers, or other sensitive information. When accessing unencrypted HTTP-enabled sites, users can fall victim to …
Remote Worker Security and Productivity The 2020 Coronavirus pandemic has lead many workers to work from home to slow its spread. As we move into a third wave of infections, …
Hacker’s Court Hearing Disrupted By Porn Clip The FBI caught the perpetrator involved in the recent Twitter Hack, 17-year old Graham Clark. Clark was having his arraignment virtually on a …
CyberHoots monthly newsletter summarizes the most important cybersecurity news from the previous month and provides some analysis specific to business owners in the small to medium sized business space.
CyberHoot Newsletters is a monthly summary of the hot cybersecurity topics published by CyberHoot in our Cybrary terms and blog over the previous 30 days. Indepth analysis, recommendations for protection, and topics pertinent to the Small-to-Medium sized Businesses (SMB) market are covered. We’re helping SMB’s even the playing field or boxing ring to ensure there’s a fair fight between them and hackers.
CyberHoot is your authority for cybersecurity news and understanding what the news means. From in-depth analysis articles to a library of 500 cybersecurity terms with related videos, CyberHoot provides you the information and training you need, when you need it.
CyberHoot’s monthly Newsletters summarize the important events from the past month of cybersecurity news. Come to one place and Become More Aware to Become More Secure.
Ruthless phishing attacks purporting to inform you of exposure to the coronavirus from a hospital are now compromising computers everywhere. Become more aware to become more secure!
Feature Story: Coronavirus 2019 (COVID19) Advisory The Coronavirus (COVID-19), has now infected nearly 90,000 235,000 people worldwide as of March 2, 2020 March 19th, 2020, killing more than 3,000 10,000 …
In this monthly Newsletter, we provide you a look at the previous month of Cybersecurity news with some analysis, some new Cybersecurity terms, and more…
SIM Swapping by Hacking Telecom Companies Hackers never cease to stop evolving and finding new ways to get your information. Hackers are now breaking into telecom companies to take over …
The Department of Homeland security’s Cybersecurity and Infrastructure Security Agency (CISA) issued a National Terrorism Advisory Bulletin on Jan. 4th, 2020. This agency only issues such warnings when there is a credible, specific and impending terrorism threat against the United States. In this case, their warning focused primarily upon cybersecurity attacks against US government and business entities in retribution for the killing of Iranian IRGC-Quds Force commander Qassem Soleimani. Iran has a history of cyber-attacks against US Businesses and government entities. Companies should be on high alert and remind employees to be especially vigilant in email phishing attacks amongst other cybersecurity best practices.