Blog > Page 2

Stay sharp with security insights


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Text Message Scams: A Growing Trend

Text Message Scams: A Growing Trend

Secure your business with CyberHoot Today!!! Sign Up Now Anyone who owns a cellphone has likely...

Read more
CyberHoot April Press Release – Assignment-Based Phishing Module

CyberHoot April Press Release – Assignment-Based Phishing Module

Click the image below to view a larger version Overview of the New Assignment-Based Phishing...

Read more
Google Docs’ Comment Phishing Exploit

Google Docs’ Comment Phishing Exploit

A wave of phishing attacks has been generated within Google's cloud-based word processing solution...

Read more
Copyright Infringement Instagram Scam

Copyright Infringement Instagram Scam

Cybercriminals are always looking for new ways to infiltrate your devices. Recently, they've been using...

Read more
Be Wary of ‘Black Friday’ Scams

Be Wary of ‘Black Friday’ Scams

Finally, we've made it through the majority of 2021 and into the Holiday season, allowing us to...

Read more
Spear-Phishing & Whaling – Day 9 of Cybersecurity Awareness Month

Spear-Phishing & Whaling – Day 9 of Cybersecurity Awareness Month

Today is Day Nine of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
BazarCaller – Vishing Gang

BazarCaller – Vishing Gang

BazarCaller is a new cybercrime gang that uses Vishing to trick its victims into handing over...

Read more
Stalkerware

Stalkerware

Stalkerware refers to tools, apps, software programs, and devices that let another person (a stalker)...

Read more
FBI Recovers Colonial Bitcoin Payment

FBI Recovers Colonial Bitcoin Payment

In May of 2021, the United States’ largest pipeline, Colonial Pipeline, halted operations due to...

Read more
FBI: Watch Out For Fake Job Listings

FBI: Watch Out For Fake Job Listings

The FBI released a statement in April 2021, warning of cybercriminals using fake job listings to target...

Read more
Quick Response (QR) Code

Quick Response (QR) Code

A Quick Response (QR) Code is a type of barcode that contains a pattern of dots and lines. It can...

Read more
Clickjacking

Clickjacking

Clickjacking, also known as a “UI Redress Attack”, is when an attacker uses multiple transparent or...

Read more
Testimonials

See who's talking about Cyberhoot

"Single Digits chose CyberHoot to address our Awareness Training and Policy Governance needs because it was simple and effective. Unlike other LMS systems which require 45-minute training videos and dozens of trick questions, our staff receives important training in less than 10 minutes once a month. I’d recommend CyberHoot to anyone looking for a quick, simple, cost-effective approach to securing their business in the 21st century. You’ll be glad you did!"

John Nelson, Single Digits, VP Engineering

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory