Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Restaurant Ordering Platforms Targeted By Hackers

Restaurant Ordering Platforms Targeted By Hackers

Secure your business with CyberHoot Today!!! Sign Up Now Customers from over 300 restaurants' had...

Read more
North Korean Hackers Posing as IT Freelancers

North Korean Hackers Posing as IT Freelancers

Secure your business with CyberHoot Today!!! Sign Up Now According to a joint advisory from the U.S....

Read more
HTML Smuggling

HTML Smuggling

Secure your business with CyberHoot Today!!! Sign Up Now HTML Smuggling is an evasive malware...

Read more
Monero – The New Crypto For Hackers

Monero – The New Crypto For Hackers

Cybercriminals had a wake-up call after the FBI successfully breached a cryptocurrency wallet held by the...

Read more
Hackers – Day 20 of Cybersecurity Awareness Month

Hackers – Day 20 of Cybersecurity Awareness Month

Today is Day 20 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Apple AirTag Attack

Apple AirTag Attack

In April of 2021, Apple unveiled the AirTag, a tracking device that can be put on nearly anything so...

Read more
Outlook “Autodiscover” Leaking Passwords

Outlook “Autodiscover” Leaking Passwords

Cybersecurity experts at Guardicore published a report summarizing its research results involving...

Read more
Japanese Crypto Exchange Robbed of $100,000,000

Japanese Crypto Exchange Robbed of $100,000,000

Recently, cryptocurrency exchanges, the place where you can buy and sell cryptocurrencies on the...

Read more
BazarCaller – Vishing Gang

BazarCaller – Vishing Gang

BazarCaller is a new cybercrime gang that uses Vishing to trick its victims into handing over...

Read more
SIM Swapping

SIM Swapping

SIM Swapping is a term used when hackers steal a victims phone number and port or switch that...

Read more
Script Kiddie

Script Kiddie

A Script Kiddie, also known as a skiddie, or skid; is an unskilled individual who uses...

Read more
Organized Crime

Organized Crime

Organized Crime refers to a category of hackers that may be transnational, national, or local in...

Read more
Testimonials

See who's talking about Cyberhoot

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack..."
John Mumford, Fellsway Group, Chief Risk Officer
“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”
Michael Gibby, SEQ IT Services, Founder & Managing Director
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”
Natalie Ripple, Redzone Technologies, System Analyst