Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Medusa Ransomware Deploys Malicious Driver to Evade Security

Medusa Ransomware Deploys Malicious Driver to Evade Security

As ransomware threats go, the Medusa ransomware group has a lengthy and notorious history of successfully...

Read more
New Rust-Based Cicada 3301 Ransomware

New Rust-Based Cicada 3301 Ransomware

In the fast-moving world of cybersecurity, hackers constantly evolve their tactics, and this time they've...

Read more
Cybersecurity Perspective on the Ticketmaster-Taylor Swift Incident

Cybersecurity Perspective on the Ticketmaster-Taylor Swift Incident

Ticketmaster, the undisputed giant of event ticketing, recently found itself at the center of a unique...

Read more
Why Ditching Passwords is the Future of Online Security

Why Ditching Passwords is the Future of Online Security

Passwordless Authentication + Enhanced Online Security = Passkeys In today's online world, the trusty password is...

Read more
Understanding the Change Healthcare Cyberattack

Understanding the Change Healthcare Cyberattack

Lessons Learned from the Change Healthcare BreachA recent cyberattack has put "a substantial...

Read more
Understanding Latrodectus: A Stealthy Cyber Threat

Understanding Latrodectus: A Stealthy Cyber Threat

Understanding, Defending, and Defeating a Stealthy Cyber ThreatIn today's ever-changing world of...

Read more
Beware of Impersonation: How to Spot Malicious Ads Disguised as Legitimate Services

Beware of Impersonation: How to Spot Malicious Ads Disguised as Legitimate Services

Protecting Against Deceptive Cyber Threats In the vast interconnected world we live in, where any single click...

Read more
CISA Issues Alert on Phobos Ransomware Targeting State and Local Governments

CISA Issues Alert on Phobos Ransomware Targeting State and Local Governments

Government Targeted Phobos Ransomware Attacks Warning by CISAPhobos OverviewPhobos Delivery...

Read more
Understanding and Protecting Against the Telegram Scams

Understanding and Protecting Against the Telegram Scams

Overview of the Telekopye Scam:Emergence and Operation of the TelekopyeThe "Telekopye Scam"...

Read more
Hackers Turn SEC Snitches: The Evolution of Ransomware Tactics

Hackers Turn SEC Snitches: The Evolution of Ransomware Tactics

Once upon a time, ransomware was like the annoying cousin at a family reunion - it showed up,...

Read more
Royal Ransomware’s Evolving Threat Vectors

Royal Ransomware’s Evolving Threat Vectors

CyberHoot has recently seen the impact of the Royal ransomware.  An MSP had a client who refused security...

Read more
Ransomware Insurance: Prescriptive and Restrictive

Ransomware Insurance: Prescriptive and Restrictive

Secure your business with CyberHoot Today!!! Sign Up Now Insurers are drafting more restrictive and...

Read more
Testimonials

See who's talking about Cyberhoot

"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."

Robyn Dunlap, Franklin Schools, Director of Technology

"While it is well known that there are many cyber security threats, sorting out how to protect yourself without accidentally exposing yourself can be a daunting task. For a small organization like ours, this type expertise and time to research it, are a rare commodity. Cyberhoot has provided us with reliable practices and training tools, in small, manageable increments, that leave us feeling confident and assured about cybersecurity."

Astrid Wielens, Zebra Crossings, Executive Director

"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."

Cris White, cyberSuite, Head of Cyber Advisory

"Cybersecurity training is complicated, partnering with CyberHoot keeps it simple. Our users are engaged with little administrative overhead."

Jeremy Treister, CMIT Solutions of Chicago Downtown, President

"The ease of setup and use for both administrators and users was immediately apparent. The automated training and phishing awareness features are major time savers for HR and IT teams”

Natalie Ripple, Redzone Technologies, System Analyst