Blog > Page 4

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Jackpotting: Asian ATM Hacking Reaches the US

Jackpotting: Asian ATM Hacking Reaches the US

Automatic Teller Machines (ATM) have long been a target of enterprising criminals. In the 1980's when...

Read more
U.S.S.S. Reporting Increase In Hacked MSPs

U.S.S.S. Reporting Increase In Hacked MSPs

Back in June, the United States Secret Service (USSS) sent out a security alert about a spike in...

Read more
Hacker’s Latest Scam: Pet Adoptions

Hacker’s Latest Scam: Pet Adoptions

Since Coronavirus (COVID-19) gained pandemic status in early March 2020, hackers have been attacking...

Read more
Social Media Used To Catch Violent Protester

Social Media Used To Catch Violent Protester

7-7-2020 1:34pm Correction: The original article stated Facial Recognition was used to catch protester....

Read more
CyberHoot Newsletter – Volume 6

CyberHoot Newsletter – Volume 6

MAZE Ransomware: 3x Threat to Data Security Ransomware has grown in popularity as a tool...

Read more
97% Top International Airports Fail Cybersecurity Test

97% Top International Airports Fail Cybersecurity Test

A few weeks ago a report was published by a cybersecurity firm, ImmuniWeb. This report revealed that...

Read more
Trello Exposes Personally Identifiable Information

Trello Exposes Personally Identifiable Information

Trello, the platform used by many businesses for organizing to-do lists and coordinating team tasks has...

Read more
Jeff Bezos and the WhatsApp Security Flaw

Jeff Bezos and the WhatsApp Security Flaw

In May of 2018, Jeff Bezos received a message on the WhatsApp application on his smartphone, from an...

Read more
CyberHoot Newsletter – Volume 3

CyberHoot Newsletter – Volume 3

Hack Back Bill ​The Active Cyber Defense Certainty Act (ACDC), also known as the "Hack Back"...

Read more
Network Based Intrusion Detection System (NIDS)

Network Based Intrusion Detection System (NIDS)

A Network Based Intrusion Detection System (NIDS), or Network Based IDS, is security hardware that is placed...

Read more
Critical Microsoft Vulnerabilities

Critical Microsoft Vulnerabilities

January 14th, 2020: Today Microsoft released their monthly patches and amongst them were three critical Severity...

Read more
Root Cause Analysis

Root Cause Analysis

Root Cause Analysis (or RCA) is a vital tool for all businesses to use when evaluating...

Read more
Testimonials

See who's talking about Cyberhoot

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner