CyberHoot Newsletter – Volume 8

Hacker’s Latest Scam: Pet Adoptions

The pandemic has led many individuals to seek a new companion in their homes, leading to a dramatic increase in pet adoptions. As a consequence, Pet Adoption scams have also spiked, increasing by more than 50% since last year at this time.

Social Media Used to Catch Violent Protester

Peaceful protests were interrupted by violence; smashing store windows, looting, and committing arson. Law enforcement sought to identify the looters, property destroyers, and arsonists using social media video and possibly other identity technologies such as tattoo recognition and facial recognition. This article examines privacy concerns as it relates to new technology.

Phish Testing Employees

Phishing attacks are something that everyone Internet user must be aware of. Phishing is social engineering that deceives users into doing something to compromise their computer, or identity, or network, or all three. Phishing emails entice users to click on malicious links or attachments, or enter credentials into a fake website. Spotting phishing attacks is a fundamental 21st century skill we all need. 

Malware in Macs

Apple’s Mac Operating Systems (OS) is impenetrable to malware. MYTH. Recent malware analysis shows Macs are vulnerable to malware attack just like other operating systems. MalwareBytes reports a 400% increase in Mac OS malware from 2018 to 2019.  Amazingly, this number of malware samples for the Mac OS was double the number found for Windows OS!  Who knew?

Hackers Release Fake Contact Tracing Apps

Contact Tracing is used to slow the spread of COVID-19. This process identifies, or traces, the people potentially exposed to COVID-19 in the recent past by an infected individual. Used legitimately, it will help flatten the curve. What happens when hackers release malware laden immitation aps? Users get compromised and data is lost or stolen!

Customer Spotlight

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."
Chris Johnson
Chris Johnson
Founder & CEO | Pinpoint Solutions Inc.

Check Out Our Latest Press Release

Cybrary Term of the Month

Disinformation is false or misleading information intentionally spread to deceive viewers and/or readers. Disinformation is propaganda which uses social engineering techniques to manipulate people into believing the information presented is factual. This propaganda has been used by Nation States to sway the thoughts of their citizens. Social engineering mixes just enough truth with a set of lies to make the propaganda seem plausible.

CyberHoot Comedy Corner

Email based authentication for Training.

Instant Access

CyberHoot provides password-less access. Zero time wasted searching for websites, resetting passwords, and delayed login. Click an email link for instant training access!

Email Based Assignments

Email Automation

Everything you need to learn cybersecurity skills is handled through email including training assignments, reminders, management compliance reports, and "My CyberHoot".

Manager Escalations

Manager Escalation

CyberHoot automates non-compliance through manager email notifications. Compliance status of employees for managers is enabled so you always know where you stand.

Micro Training

Cyber"Hoots" are most often 5 minutes or less. This ensures your staff get trained quickly with the most effective solution.

The Power of Open

CyberHoot is an open cybersecurity training Platform. Any video or PDF can be used to train and govern your employees.


In a survey of 100 CyberHoot users, 60% would be "Disappointed" or "Very Disappointed" if CyberHoot Training was stopped.

Share this on your social networks. Help Friends, Family, and Colleagues become more aware and secure.