CyberHoot
Protecting Your Data: Lessons from the “Dropbox Sign” API and OAuth Breach
Explore the implications of the Dropbox Sign Breach incident, emphasizing the critical role of cybersecurity measures in defending against API key and OAuth token theft. It discusses the methods used by attackers, offers practical insights for safeguarding data, and underscores the ongoing need for vigilance in today's interconnected digital landscape.
HowTo: How to Add Users via Google Workspace Sync
CyberHoot supports 3 forms of multi-factor authentication: Email, SMS, and Authenticator applications. This article explains how to set each up and provides a video overview of how to setup an authenticator application.
Why Ditching Passwords is the Future of Online Security
For over 40 years, passwords have been the cornerstone of computer security, despite their many flaws. People turned to password managers to simplify and secure their login processes. Now, passkeys are set to revolutionize how we secure our online identities. Unlike traditional passwords, passkeys eliminate many common security risks, making them a crucial advancement everyone should understand. This article will explain what passkeys are, how they work, and why they represent the future of identity management online.
CyberHoot Newsletter – Q1 2024 January, February, March
“CyberHoot’s Newsletter has been on a brief hiatus as we focused on critical product improvements, finished 2024 strategic planning, and addressed performance improvements. This newsletter is chock full of cyber ...
Understanding the Change Healthcare Cyberattack
Lessons learned from the Change Healthcare data breach can teach us immediate actions we can take to reduce the chance of a breach in our own companies, networks, and the loss of the data entrusted to us.
CISCO Zero Days in ASA and Firepower Threat Defense Solutions – Patch Now
ArcaneDoor delivers malware via zero-day exploits to CISCO ASA and Firepower network security devices. Patches are available and need to be applied once system integrity is verified.
Understanding Latrodectus: A Stealthy Cyber Threat
The recent sophisticated breach of Microsoft Executive emails is a stark reminder that all of us can be targeted with phishing and social engineering attacks and need to prepare by training, testing, and governing employees on Cyber Literacy.
Beware of Impersonation: How to Spot Malicious Ads Disguised as Legitimate Services
The recent sophisticated breach of Microsoft Executive emails is a stark reminder that all of us can be targeted with phishing and social engineering attacks and need to prepare by training, testing, and governing employees on Cyber Literacy.
CISA Issues Alert on Phobos Ransomware Targeting State and Local Governments
The recent sophisticated breach of Microsoft Executive emails is a stark reminder that all of us can be targeted with phishing and social engineering attacks and need to prepare by training, testing, and governing employees on Cyber Literacy.
Exposing the Apple ID Push Bombing Scam: Essential Protection Strategies
The recent sophisticated breach of Microsoft Executive emails is a stark reminder that all of us can be targeted with phishing and social engineering attacks and need to prepare by training, testing, and governing employees on Cyber Literacy.