Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
HowTo: Allow-list CyberHoot Phishing in AppRiver

HowTo: Allow-list CyberHoot Phishing in AppRiver

How to Allow-list in AppRiverIf you're using AppRiver's SpamLab spam filtering, you can add CyberHoot to your...

Read more
LinkedIn Phishing Slink Attack

LinkedIn Phishing Slink Attack

Secure your business with CyberHoot Today!!! Sign Up Now Hackers have found a new way to trick...

Read more
‘Tis The Season To Be Smished

‘Tis The Season To Be Smished

The holiday shopping season means big business for retailers around the world, but it unfortunately...

Read more
Phishing Attacks – Day 5 of Cybersecurity Awareness Month

Phishing Attacks – Day 5 of Cybersecurity Awareness Month

Today is Day Five of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Business Email Compromise (BEC)

Business Email Compromise (BEC)

Business Email Compromise (BEC) is when an email account, often in a company's finance department, is...

Read more
Clickbait

Clickbait

Clickbait is Internet content that uses overemphasized or misleading headlines to lure a person into...

Read more
Reconnaissance

Reconnaissance

Reconnaissance in cybersecurity refers to the preliminary step of a cyberattack, where a hacker is...

Read more
Malicious URL

Malicious URL

A Malicious URL is a link created with the purpose of promoting scams, attacks, and fraud. By clicking...

Read more
Smishing, The New Phishing

Smishing, The New Phishing

Many people know about Phishing, a form of social engineering to deceive individuals into doing a...

Read more
Email Impersonation

Email Impersonation

Email Impersonation is a form of phishing attack where a hacker impersonates someone else in the hopes it was...

Read more
Session Hijacking Attack

Session Hijacking Attack

A Session Hijacking Attack occurs when a user session is taken over by an attacker. A normal session...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"Managed Service Providers (MSP's) are constantly bombarded with new vendors and products that either overlap with a product already in our line cards or is difficult to get client buy in. Cyberhoot brings a new product/service to the MSP space that is unique and compelling. CyberHoot allows MSP's to shape the learning experiences of their clients resulting in powerful outcomes. I highly recommend you take a look at CyberHoot for your Learning Management System needs."

Chris Johnson, MSP-Ignite, Founder & CEO

"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."

Max Krider, Creative Tech, HIPAA Compliance Officer

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director