"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Add CyberHoot to Safe Senders Listing Adding senders to end-users "safe senders" list will remove the "Some...
Read moreWelcome to Shoot the Hoot…RAW! Welcome back to Episode 3 of Shoot the Hoot—the weekly livestream hosted by...
Read moreWelcome to Shoot the Hoot…RAW! Welcome back to Episode 2 of Shoot the Hoot—the weekly livestream hosted by...
Read moreWelcome to CyberHoot's Partner Spotlight! In this series, we celebrate outstanding MSPs who go above and...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreA newly uncovered cyberattack campaign is exploiting Zoom’s Remote Control feature to infiltrate the systems...
Read moreRecent reports have exposed sophisticated schemes where fraudulent technology workers, often using fake...
Read moreCyberHoot CEO on FireTail: Modern Cyber's Podcast In this episode, FireTail's host Andrew speaks with Craig...
Read moreIn today's world, our smartphones are like an extra limb. We use them for everything—keeping up...
Read moreRansomware Risks from Remote Access ToolsHackers are constantly evolving their tactics and...
Read moreSafeguarding Against API Key and OAuth Token TheftOne of the risks of using an expanding cadre of...
Read morePasswordless Authentication + Enhanced Online Security = Passkeys In today's online world, the trusty password is...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.