Since November 2025, our teams have repeatedly observed email-borne intrusion chains culminating in the delivery…
At the end of February 2026, a large-scale phishing campaign targeting French internet users was identified.…
In this article, we provide a step-by-step breakdown of an attack chain exploiting a Google…
At Hornetsecurity, our Threat Research and Response activities continuously analyze real-world email attacks observed across…
Sophisticated cybercriminals exploit this limitation by creating slightly modified visual representations that can slip past…
In our previous article, we explored how Computer Vision can be used to enhance cybersecurity…
Welcome to the first article of our four-part series on the topic of the detection…
Artificial intelligence (AI) has been in the spotlight for the last couple of years but…
For several months now, Hornetsecurity has been thoroughly investigating an attack used on a massive…