Blog

Stay sharp with security insights

Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.


Your subscription could not be saved. Please try again.
Subscription Successful! You are now subscribed to our newsletter!
MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

MongoBleed: Why 87,000 Databases Had Their Front Doors Wide Open (And How to Close Yours)

Remember Heartbleed? That security nightmare from a few years back that made everyone panic about their...

Read more
Dual Critical Advisory: Critical Vulnerabilities in Veeam Backup & Replication and SonicWall SonicOS

Dual Critical Advisory: Critical Vulnerabilities in Veeam Backup & Replication and SonicWall SonicOS

Veeam Backup & Replication: Critical Patches for Vulnerabilities Overview: Veeam released patches for 13...

Read more
Critical Advisory: OpenSSH Remote Code Execution Vulnerability

Critical Advisory: OpenSSH Remote Code Execution Vulnerability

What Happened?A critical vulnerability, tracked as CVE-2023-38408, has been discovered in...

Read more
Security Advisory: Critical Patches in Adobe and Microsoft Products

Security Advisory: Critical Patches in Adobe and Microsoft Products

CyberHoot Vulnerability Alert Management Process (VAMP) Rating: Critical/Red July 19th, 2022:...

Read more
Security Advisory: Adobe Vulnerabilities Allow Code Execution

Security Advisory: Adobe Vulnerabilities Allow Code Execution

CyberHoot Vulnerability Alert Management Process Rating (VAMP): Critical/Red June 15th, 2022:...

Read more
Security Advisory: Android UNISOC Chip Vulnerability

Security Advisory: Android UNISOC Chip Vulnerability

CyberHoot Vulnerability Alert Management Process Rating (VAMP): Critical/Red June 7th, 2022: CyberHoot...

Read more
Security Advisory: SonicWall Authentication Vulnerability

Security Advisory: SonicWall Authentication Vulnerability

May 16th, 2022: CyberHoot has investigated a SonicWall advisory warning of a trio of security flaws in...

Read more
Vulnerability Scanning

Vulnerability Scanning

Vulnerability Scanning is the process of identifying security weaknesses and coding flaws in systems and...

Read more
Vulnerability & Penetration Testing – Day 29 of CSAM

Vulnerability & Penetration Testing – Day 29 of CSAM

Today is Day 29 of Cybersecurity Awareness Month, each day, we will be publishing a video outlining necessary...

Read more
CISA’s Top Vulnerabilities in 2020 and 2021

CISA’s Top Vulnerabilities in 2020 and 2021

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) teamed up with the Australian Cyber...

Read more
Microsoft’s PrintNightmare Vulnerability

Microsoft’s PrintNightmare Vulnerability

Microsoft's released an Out-Of-Band (OOB) emergency patch, affecting windows systems' print-spooler...

Read more
WordPress Site Risks

WordPress Site Risks

WordPress websites account for more than one-third of all websites on the Internet. WordPress is both...

Read more
Testimonials

See who's talking about Cyberhoot

"Craig and the CyberHoot team are great business partners! They are always open to enhancing their product, and ready to help my team with any deployment questions they may have. I am also an end user of the CyberHoot security..."
Marisa Zelfond, TekDoc, Director of Sales & Account Management
"Using CyberHoot was one of the best decisions we made regarding SAT. Fully automated, training is interesting, staff participation is high compared to other vendors."
Max Krider, Creative Tech, HIPAA Compliance Officer
"CyberHoot is a great option for Cybersecurity for our schools. The videos and other training are very user-friendly. Their support is fantastic as well."
Robyn Dunlap, Franklin Schools, Director of Technology
"CyberHoot's cyber awareness training is a game-changer for businesses looking to build a strong security culture."
Cris White, cyberSuite, Head of Cyber Advisory
"Easy to implement and get immediate results. Through CyberHoot, I can single-handedly support a company with 500 people in training and policy governance with a minimum of effort. More employees now send me phishing emails they receive, stating 'this is..."
Tim Hurman, Single Digits, System Administrator