Blog > Page 2

Blog


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Medusa Ransomware Deploys Malicious Driver to Evade Security

Medusa Ransomware Deploys Malicious Driver to Evade Security

As ransomware threats go, the Medusa ransomware group has a lengthy and notorious history of successfully...

Read more
CyberHoot Newsletter – March 2025

CyberHoot Newsletter – March 2025

Welcome to CyberHoot's March Newsletter!As cyber threats continue to evolve, staying informed...

Read more
Polymorphic Extensions: A New Cyber Threat Impersonating Your Add-Ons

Polymorphic Extensions: A New Cyber Threat Impersonating Your Add-Ons

In a recent revelation, cybersecurity researchers from sqrx.com have uncovered a sophisticated attack method...

Read more
The Sophisticated Malware-as-a-Service Ecosystem of EncryptHub

The Sophisticated Malware-as-a-Service Ecosystem of EncryptHub

Dark Web Hacking Groups Mirror Real-World SaaS Companies In today's hyper connected world, the distinction...

Read more
Advisory: Critical Microsoft Outlook Vulnerability

Advisory: Critical Microsoft Outlook Vulnerability

Overview A Checkpoint security researcher has discovered a critical vulnerability in Microsoft Outlook that poses...

Read more
Hackers Exploit CAPTCHA Trick on Webflow to Deliver Phishing Attacks

Hackers Exploit CAPTCHA Trick on Webflow to Deliver Phishing Attacks

In today’s ever evolving cyber threat landscape, attackers are finding innovative ways to bypass traditional...

Read more
CyberHoot Newsletter – February 2025

CyberHoot Newsletter – February 2025

Welcome to CyberHoot's February Newsletter!This month, we’re diving into some critical...

Read more
USPS Text Scam: Cybercriminals Hiding Malicious PDFs

USPS Text Scam: Cybercriminals Hiding Malicious PDFs

In the ever-evolving landscape of cybercrime, scammers are constantly finding innovative ways to...

Read more
U.S Navy Limits DeepSeek AI Over Cybersecurity Concerns

U.S Navy Limits DeepSeek AI Over Cybersecurity Concerns

Three weeks ago a new AI service came to market called DeepSeek.  Competing with US AI startup...

Read more
The Importance of Encrypted Apps in Today’s Cybersecurity Landscape

The Importance of Encrypted Apps in Today’s Cybersecurity Landscape

As Nation-State cyberattacks become increasingly sophisticated and widespread, U.S. officials are urging...

Read more
Critical Advisory: FortiGate SSL VPN Breach

Critical Advisory: FortiGate SSL VPN Breach

Incident Overview A significant breach affecting FortiGate’s SSL VPNs has exposed vulnerabilities in nearly all...

Read more
Beware of FireScam: Malware Masquerading as Telegram

Beware of FireScam: Malware Masquerading as Telegram

In a disturbing development for Android users, cybersecurity experts have uncovered a new malware campaign known...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator