CyberHoot
Cybersecurity Perspective on the Ticketmaster-Taylor Swift Incident
A unique ransomware scheme is seeking to extort money from Ticketmaster to prevent the release of printable tickets and concert chaos.
How MFA Failures and Rising Ransomware Costs are Threatening Cybersecurity
Discover how MFA failures are contributing to a 500% surge in ransomware costs and learn how adopting Passkeys can enhance your cybersecurity defenses.
Critical Advisory: OpenSSH Remote Code Execution Vulnerability
Learn about the critical OpenSSH vulnerability CVE-2023-38408 that allows remote code execution via the ssh-agent’s forwarding feature. Discover immediate steps to protect your systems, including upgrading to OpenSSH 9.3p2, restricting PKCS#11 providers, and enhancing security measures.
The Evolving Kill Chain (On-Premise vs. SaaS)
Learn how to protect your business from the evolving SaaS kill chain by understanding the stages of cyber attacks, or kill chain links, and the nuances of on-premise vs. SaaS models of the kill-chain.
Hackers Exploiting Legitimate Websites
Learn how hackers exploit legitimate websites to launch sophisticated attacks and discover ways to protect yourself from these evolving cybersecurity threats.
CyberHoot Newsletter – May 2024
Time-Intensive Mobile Hacks Are Causing Big Headaches for Companies Time-Intensive Mobile Hacks: Discover how time-intensive mobile hacks are evolving and what companies can do to protect themselves from these sophisticated ...
Understanding Credential Stuffing Attacks
Learn how Okta is addressing credential stuffing attacks and what steps users can take to protect their accounts from this growing cybersecurity threat.
HowTo: Manually Send Welcome Emails
This HowTo article shows how to manually send "Welcome Emails" within CyberHoot's Power and Autopilot platforms.
FireTail Podcast: CyberHoot CEO Craig Taylor
Business Ninja's interviewed CyberHoot's co-Founder Craig Taylor. This interview outlines CyberHoot's unique and positive outcome approach to cybersecurity program development at your company. Our Co-Founder details what's working and what's broken in the emergency Cybersecurity industry. Business owners need to watch to learn what they should be doing to protect their businesses from compromise. Doing so provides much needed peace of mind.
HowTo: Reauthorize Entra ID – Client Secret
Microsoft GCC Azure Sync requires an Enterprise Application currently within CyberHoot. This article explains how to set this up.