CYBER THREAT REPORT Edition 2021/2022
Learn everything about current email security threats in Hornetsecurity’s brand new Cyber Threat Report.
These are the dangers companies need to be aware of when opening emails
Spam, threats, and advanced threats: the hidden dangers of email traffic
Email is still the most popular way of communicating for companies. However, not all emails that land in employee inboxes, are wanted. Our Security Lab’s threat researchers analyzed email traffic and found that 40% of all emails received by Hornetsecurity were classified as unwanted by the internal filtering systems, and therefore contained potential threats to the company.
But what threats were in those unwanted emails? What are the risks posed by new types of malware and deceptive approaches of cybercriminals? Find out more about cyber threats in the 2021/2022 Cyber Threat Report!
Warning, attachment: These file types are used to hide malware and co.
In order not to be detected by different spam and virus filters, cybercriminals hide malware in their email attacks in various ways. With a share of 33.6%, archives have been the most popular attachment among cybercriminals to spread malware.
Find out why archives are so popular with cybercriminals, and what dangers malicious HTML, PDF, and Excel files pose in the 2021/2022 Cyber Threat Report.
Archives are the most popular attachment among cybercriminals to spread malware.
Cyber Threat Report 2021/2022: Download now for free!
The new Cyber Threat Report is now available. Fill out the form and get free access to information about the newest cyber threats, and brand-new analysis and statistics from the Hornetsecurity Security Lab.
Cyber Security Blog
Find more current news about IT security and the world of Hornetsecurity on our blog.
Once a month, Hornetsecurity Security Lab’s threat researchers publish the Email Threat Review, where you will find current information on phishing, spam, and malware campaigns, various events from the cybercrime world, and exclusive graphics and statistics on attack tactics. Head over to the Hornetsecurity blog.