Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
HowTo: Allow-list CyberHoot Phishing in AppRiver

HowTo: Allow-list CyberHoot Phishing in AppRiver

How to Allow-list in AppRiverIf you're using AppRiver's SpamLab spam filtering, you can add CyberHoot to your...

Read more
LinkedIn Phishing Slink Attack

LinkedIn Phishing Slink Attack

Secure your business with CyberHoot Today!!! Sign Up Now Hackers have found a new way to trick...

Read more
‘Tis The Season To Be Smished

‘Tis The Season To Be Smished

The holiday shopping season means big business for retailers around the world, but it unfortunately...

Read more
Phishing Attacks – Day 5 of Cybersecurity Awareness Month

Phishing Attacks – Day 5 of Cybersecurity Awareness Month

Today is Day Five of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
Business Email Compromise (BEC)

Business Email Compromise (BEC)

Business Email Compromise (BEC) is when an email account, often in a company's finance department, is...

Read more
Clickbait

Clickbait

Clickbait is Internet content that uses overemphasized or misleading headlines to lure a person into...

Read more
Reconnaissance

Reconnaissance

Reconnaissance in cybersecurity refers to the preliminary step of a cyberattack, where a hacker is...

Read more
Malicious URL

Malicious URL

A Malicious URL is a link created with the purpose of promoting scams, attacks, and fraud. By clicking...

Read more
Smishing, The New Phishing

Smishing, The New Phishing

Many people know about Phishing, a form of social engineering to deceive individuals into doing a...

Read more
Email Impersonation

Email Impersonation

Email Impersonation is a form of phishing attack where a hacker impersonates someone else in the hopes it was...

Read more
Session Hijacking Attack

Session Hijacking Attack

A Session Hijacking Attack occurs when a user session is taken over by an attacker. A normal session...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot lets us access expert cybersecurity guidance without hiring a full-time specialist."

Chris McKay, LMRPA, Vice President, Partner

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO