Blog > Page 8

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Hacker’s Latest Scam: Pet Adoptions

Hacker’s Latest Scam: Pet Adoptions

Since Coronavirus (COVID-19) gained pandemic status in early March 2020, hackers have been attacking...

Read more
Social Media Used To Catch Violent Protester

Social Media Used To Catch Violent Protester

7-7-2020 1:34pm Correction: The original article stated Facial Recognition was used to catch protester....

Read more
Hackers Are Releasing Fake Contact Tracing Apps

Hackers Are Releasing Fake Contact Tracing Apps

During the coronavirus pandemic, Contact Tracing is being used to slow the spread of the virus. Contact...

Read more
Phish Testing Employees

Phish Testing Employees

Phishing attacks are something that everyone who uses the Internet must be aware of. For those who may...

Read more
Facial Recognition Technology Through Coronavirus Masks

Facial Recognition Technology Through Coronavirus Masks

With the issues we are facing today with the coronavirus, many technology companies are looking for...

Read more
Attacks on Mobile Devices Increasing

Attacks on Mobile Devices Increasing

In 2020, the number of daily smartphone users in the world totals 3.5 Billion or 45% of the...

Read more
Shark Tank Host Phished For Nearly $400K

Shark Tank Host Phished For Nearly $400K

Barbara Corcoran, a world famous Shark Tank host, was scammed out of nearly $400,000 in late February....

Read more
Stay Secure While Working Remotely

Stay Secure While Working Remotely

In the last two weeks, most of us in the workforce have been being asked or forced to work from home...

Read more
Trello Exposes Personally Identifiable Information

Trello Exposes Personally Identifiable Information

Trello, the platform used by many businesses for organizing to-do lists and coordinating team tasks has...

Read more
BlueKeep is MS Blaster

BlueKeep is MS Blaster

George Santayana (Sketch artist: Samuel Johnson Woolf) "Those who cannot remember the past are condemned to...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."
Chris McKay, LMRPA, Vice President, Partner
"I reviewed over a dozen learning management platforms, and I have to say, CyberHoot is soaring way above the others."
Nick Marteney, MotherBear Security, Co-Founder & CEO
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO