Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
Quarantine

Quarantine

Quarantine in the cybersecurity world happens when files containing malware are placed into isolation...

Read more
Polymorphic Virus

Polymorphic Virus

A Polymorphic Virus is a type of 'shape-shifting' virus, producing malicious code that is able to...

Read more
Parasitic Virus

Parasitic Virus

A Parasitic Virus, also known as a file virus, is spread by attaching itself to executable programs....

Read more
Boot Sector Virus

Boot Sector Virus

A Boot Sector Virus is a virus that infects the 'boot sector' of floppy disks or the 'Master Boot...

Read more
Macro Virus

Macro Virus

A Macro Virus is a virus that adds its code to the macros embedded within documents, spreadsheets,...

Read more
Memory-Resident Virus

Memory-Resident Virus

A Memory-Resident Virus is a virus that is located in the memory of a computer, even after the 'host'...

Read more
SQL Slammer Virus (Harbinger of things to come)

SQL Slammer Virus (Harbinger of things to come)

SQL Slammer Spread 30 min Coronavirus Spread 90+ Days The SQL Slammer Virus, also known as the Sapphire Virus,...

Read more
Stuxnet

Stuxnet

Stuxnet is a computer worm that was uncovered in 2010, which many people believe was in development...

Read more
Melissa Virus

Melissa Virus

The Melissa Virus is malware that was was deployed in late March of 1999. A programmer by the name of...

Read more
ILOVEYOU Virus

ILOVEYOU Virus

The ILOVEYOU Virus, also known as, the Love Bug, is a computer worm that infected over 10 million...

Read more
Trojan Horse

Trojan Horse

A Trojan Horse is a computer program that appears to have a useful function, but also has a hidden and...

Read more
Virus

Virus

Image Source A virus is a computer program that can replicate itself, infect a computer without permission...

Read more
Testimonials

See who's talking about Cyberhoot

“Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, and staff participation is high compared to other vendors.”

Michael Gibby, SEQ IT Services, Founder & Managing Director

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security tool which I find to be extremely intuitive, quick, and helpful."

Marisa Zelfond, TekDoc, Director of Sales & Account Management

"CyberHoot has been a game-changer for us - simple to deploy, highly effective in raising awareness, and a great fit for MSPs looking to strengthen client security postures without adding complexity."

Ahmed Albalooshi, Advantari Digital Solutions, CEO

"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is a phishing email' as opposed to just clicking on them."

Tim Hurman, Single Digits, System Administrator

"After 9 months of CyberHoot awareness training, a Financial Management firm with $4 Billion in assets was phish tested by the Fellsway Group. They had zero (0%) employees click on the phishing test. In contrast, the exact same phishing attack had a 30% click rate at another client that had not yet done CyberHoot training. The product really proves its worth!"

John Mumford, Fellsway Group, Chief Risk Officer