Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
HowTo: Allow-list CyberHoot Phishing in AppRiver

HowTo: Allow-list CyberHoot Phishing in AppRiver

How to Allow-list in AppRiverIf you're using AppRiver's SpamLab spam filtering, you can add CyberHoot to your...

Read more
LinkedIn Phishing Slink Attack

LinkedIn Phishing Slink Attack

Secure your business with CyberHoot Today!!! Sign Up Now Hackers have found a new way to trick...

Read more
‘Tis The Season To Be Smished

‘Tis The Season To Be Smished

The holiday shopping season means big business for retailers around the world, but it unfortunately...

Read more
Phishing Attacks – Day 5 of Cybersecurity Awareness Month

Phishing Attacks – Day 5 of Cybersecurity Awareness Month

Today is Day Five of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Business Email Compromise (BEC)

Business Email Compromise (BEC)

Business Email Compromise (BEC) is when an email account, often in a company's finance department, is broken into...

Read more
Clickbait

Clickbait

Clickbait is Internet content that uses overemphasized or misleading headlines to lure a person into...

Read more
Reconnaissance

Reconnaissance

Reconnaissance in cybersecurity refers to the preliminary step of a cyberattack, where a hacker is...

Read more
Malicious URL

Malicious URL

A Malicious URL is a link created with the purpose of promoting scams, attacks, and fraud. By clicking...

Read more
Smishing, The New Phishing

Smishing, The New Phishing

Many people know about Phishing, a form of social engineering to deceive individuals into doing a...

Read more
Email Impersonation

Email Impersonation

Email Impersonation is a form of phishing attack where a hacker impersonates someone else in the hopes it was...

Read more
Session Hijacking Attack

Session Hijacking Attack

A Session Hijacking Attack occurs when a user session is taken over by an attacker. A normal session...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory
"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less..."
John Nelson, Single Digits, VP Engineering
"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."
Ahmed Albalooshi, Advantari Digital Solutions, CEO
"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space..."
Chris Johnson, MSP-Ignite, Founder & CEO
"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
Robyn Dunlap, Franklin Schools, Director of Technology