Blog > Page 2

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...

Read more
QR Codes Are Back (They Still Want Your Password)

QR Codes Are Back (They Still Want Your Password)

Remember 2020? We scanned QR codes for everything. Restaurant menus. Parking meters. That awkward moment at a...

Read more
AI-Powered Phishing Kits Are Game-Changing, In a Very Bad Way

AI-Powered Phishing Kits Are Game-Changing, In a Very Bad Way

Phishing emails used to be easy to spot. Bad grammar. Weird links. Obvious scams. Those days are...

Read more
AI Poisoning: Fake Support Scam — AI Search as the New Attack Surface

AI Poisoning: Fake Support Scam — AI Search as the New Attack Surface

Cybercriminals always follow Internet eyeballs. Not literally, but figuratively. And today's eyeballs are...

Read more
CISA Details an Emerging Mobile Spyware Alert

CISA Details an Emerging Mobile Spyware Alert

Active Attacks on Messaging Apps The Cybersecurity and Infrastructure Security Agency (CISA) recently issued...

Read more
Zero Trust RPAM: The Future of Secure Remote Access

Zero Trust RPAM: The Future of Secure Remote Access

The world of work has changed enormously since COVID-19. Gone are the days when IT admins sat behind a corporate...

Read more
Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Microsoft Integrates Passkeys into Windows: is this the start of a Passwordless Future?

Let’s be honest, who hasn’t reset a password at least once this month? For decades, passwords have been our...

Read more
When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

When You Become the Hacker: How Modern Attacks Trick You Into Hacking Yourself

In a shift away from the usual “hack-meets-victim” narrative, a new kind of cyber-assault is emerging. One...

Read more
Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

Domain Takedowns: How to Remove Fraudulent and Typo-squatted Domains and Websites

In cybersecurity, not all attacks happen through fancy malware or zero-day exploits. Some of the most effective...

Read more
The AI Threat Awakens: What OpenAI’s Latest Report Reveals About Cybercrime

The AI Threat Awakens: What OpenAI’s Latest Report Reveals About Cybercrime

The rapid rise of generative AI has unlocked enormous promise, but it’s also accelerating the arms race in...

Read more
Klopatra: New Android Trojan Drains Bank Accounts via Hidden VNC

Klopatra: New Android Trojan Drains Bank Accounts via Hidden VNC

Newly discovered Android banking Remote Access Trojan (RAT), dubbed Klopatra, has compromised more than 3,000...

Read more
When One Password Ends It All

When One Password Ends It All

In June 2025, KNP Logistics Group, a transport company in the UK with 500 trucks and nearly two centuries of...

Read more
Testimonials

See who's talking about Cyberhoot

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"I reviewed over a dozen learning management platforms, and I have to say, CyberHoot is soaring way above the others."
Nick Marteney, MotherBear Security, Co-Founder & CEO
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director