Blog > Page 4

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Jackpotting: Asian ATM Hacking Reaches the US

Jackpotting: Asian ATM Hacking Reaches the US

Automatic Teller Machines (ATM) have long been a target of enterprising criminals. In the 1980's when...

Read more
U.S.S.S. Reporting Increase In Hacked MSPs

U.S.S.S. Reporting Increase In Hacked MSPs

Back in June, the United States Secret Service (USSS) sent out a security alert about a spike in...

Read more
Hacker’s Latest Scam: Pet Adoptions

Hacker’s Latest Scam: Pet Adoptions

Since Coronavirus (COVID-19) gained pandemic status in early March 2020, hackers have been attacking...

Read more
Social Media Used To Catch Violent Protester

Social Media Used To Catch Violent Protester

7-7-2020 1:34pm Correction: The original article stated Facial Recognition was used to catch protester....

Read more
CyberHoot Newsletter – Volume 6

CyberHoot Newsletter – Volume 6

MAZE Ransomware: 3x Threat to Data Security Ransomware has grown in popularity as a tool...

Read more
97% Top International Airports Fail Cybersecurity Test

97% Top International Airports Fail Cybersecurity Test

A few weeks ago a report was published by a cybersecurity firm, ImmuniWeb. This report revealed that...

Read more
Trello Exposes Personally Identifiable Information

Trello Exposes Personally Identifiable Information

Trello, the platform used by many businesses for organizing to-do lists and coordinating team tasks has...

Read more
Jeff Bezos and the WhatsApp Security Flaw

Jeff Bezos and the WhatsApp Security Flaw

In May of 2018, Jeff Bezos received a message on the WhatsApp application on his smartphone, from an...

Read more
CyberHoot Newsletter – Volume 3

CyberHoot Newsletter – Volume 3

Hack Back Bill ​The Active Cyber Defense Certainty Act (ACDC), also known as the "Hack Back"...

Read more
Network Based Intrusion Detection System (NIDS)

Network Based Intrusion Detection System (NIDS)

A Network Based Intrusion Detection System (NIDS), or Network Based IDS, is security hardware that is placed...

Read more
Critical Microsoft Vulnerabilities

Critical Microsoft Vulnerabilities

January 14th, 2020: Today Microsoft released their monthly patches and amongst them were three critical Severity...

Read more
Root Cause Analysis

Root Cause Analysis

Root Cause Analysis (or RCA) is a vital tool for all businesses to use when evaluating...

Read more
Testimonials

See who's talking about Cyberhoot

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research..."
Astrid Wielens, Zebra Crossings, Executive Director
"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Ahmed Albalooshi, Advantari Digital Solutions, CEO
"CyberHoot is an excellent cybersecurity training platform that educates teams on security practices through training content, phishing simulations, and actionable analytics."
Tim Ward, Goodwill of Chattanooga, Director, Information Technology