Knowledge base

Explanations of terms and information from the world of IT security

Information on IT Security Topics

Our knowledge database provides you with valuable information on various topics in the field of IT security. Find out which dangers exist and how you can specifically counter the threat situations to ward off CEO fraud, ransomware, phishing and the like. In addition, you receive an overview of relevant terms in the field of information security.

Hornetsecurity Knowledge Base

Brute-Force attacks

A brute-force attack is a trial-and-error method used to obtain information such as passwords or other access codes. Here, the attacker tries a variety of …

Cyber Kill Chain

To identify and combat attacks along the Cyber Kill Chain in time, you need to understand the strategies of the criminals …

Email encryption basics

Hornetsecurity explains the basics of email encryption for businesses. From PGP to TLS and S/MIME to certificates and signatures …

GoBD

GoBD are the Principles for properly maintaining, keeping and storing books, records and documents in electronic form and for data access, as provided …

Ransomware Kill Chain (1)

Why ransomware is not a typical cyberattack? Normally, the data theft remains undetected. This is especially true when the systems are insufficiently protected. But it is quite a different case with ransomware …

Cryptolocker Ransomware

The cryptolocker ransomware was a polymorphic virus, which was used to encrypted computer systems. The only option affected …

Ransomware Kill Chain (2)

How to use the Ransomware Kill Chain model to devise countermeasures? The Ransomware Kill Chain using Wanna Cry as an example …

Mirai – The Botnet of Things

In October 2016, the Mirai botnet became widely known for the first time: the largest DDoS attack ever launched on the DNS provider “Dyn” shuts down Amazon and Netflix for several hours. The botnet consisted of hacked smart devices – an enormous security vulnerability in the Internet of Things was revealed. What does this mean for digitization in companies? And who exactly is behind the dangerous IoT virus Mirai?

Crypto mining – From the gold rush in the digital world

Crypto currencies have established as a legitimate means of payment in the digital world. However, “mining” these currencies involves a great deal of effort – cybercriminals have developed methods to illegally gain access to the new gold. Especially companies are at the mercy…We examine the mining of modern times and clarify the most important questions.