Blog

Cybrary


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Prompt Injection

Prompt Injection

Prompt injection is a class of attacks in which a malicious actor crafts inputs designed to manipulate a large...

Read more
Large Language Model (LLM)

Large Language Model (LLM)

A large language model (LLM) is a type of artificial intelligence model trained on massive volumes of text to...

Read more
Retrieval-Augmented Generation (RAG)

Retrieval-Augmented Generation (RAG)

Retrieval-Augmented Generation (RAG) is an AI architecture pattern that combines a search or retrieval step with...

Read more
Model Extraction Attack

Model Extraction Attack

A model extraction attack is a technique in which an adversary repeatedly queries a hosted machine learning or AI...

Read more
Data Poisoning (Poisoning Attack)

Data Poisoning (Poisoning Attack)

Data poisoning is an attack in which an adversary deliberately injects malicious, misleading, or biased data into...

Read more
Prompt Engineering

Prompt Engineering

Prompt engineering is the practice of designing, structuring, and refining the instructions given to a large...

Read more
Vector Database / Vector Store

Vector Database / Vector Store

A vector database, also called a vector store, is a specialized data system designed to store and search vector...

Read more
Embeddings (Text Embeddings)

Embeddings (Text Embeddings)

Text embeddings are numerical representations of text where words, sentences, or entire documents are converted...

Read more
hCaptcha

hCaptcha

hCaptcha is a bot mitigation and anti-spam service that helps websites distinguish between real human users and...

Read more
Quishing

Quishing

Quishing is a type of phishing attack that targets users via QR codes. Attackers create malicious QR codes that,...

Read more
Malvertising

Malvertising

Malvertising is short for malicious advertising. It refers to the use of online ads to deliver malware to...

Read more
Privacy-Enhancing Computation (PEC)

Privacy-Enhancing Computation (PEC)

Privacy-Enhancing Computation (PEC) refers to a set of technologies and methods that allow organizations to...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory
"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."
Jeremy Treister, CMIT Solutions of Chicago Downtown, President
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer