Knowledge base

Explanations of terms and information from the world of IT security

Our knowledge database provides you with valuable information on various topics in the field of IT security. Find out which dangers exist and how you can specifically counter the threat situations to ward off CEO fraud, ransomware, phishing and the like. In addition, you receive an overview of relevant terms in the field of information security.

Hornetsecurity Podcast

Brute-Force attacks

A brute-force attack is a trial-and-error method used to obtain information such as passwords or other access codes. Here, the attacker tries a variety of …


GoBD are the Principles for properly maintaining, keeping and storing books, records and documents in electronic form and for data access, as provided …

Cryptolocker Ransomware

The cryptolocker ransomware was a polymorphic virus, which was used to encrypted computer systems. The only option affected …

Cyber Kill Chain

To identify and combat attacks along the Cyber Kill Chain in time, you need to understand the strategies of the criminals …

Email encryption basics

Hornetsecurity explains the basics of email encryption for businesses. From PGP to TLS and S/MIME to certificates and signatures …

Ransomware Kill Chain (1)

Why ransomware is not a typical cyberattack? Normally, the data theft remains undetected. This is especially true when the systems …

Ransomware Kill Chain (2)

How to use the Ransomware Kill Chain model to devise countermeasures? The Ransomware Kill Chain using Wanna Cry as an example …


The word “ransomware” comes from the English language and contains the term “ransom”, which translated means “held hostage for money”…

The most important IT news. Read our latest blog posts

A journey through the history of cryptography – Part 1

A journey through the history of cryptography – Part 1

The implementation of encryption strategies in companies is becoming increasingly popular. The strongest driver of this process is the ratification of the GDPR in May 2018, but encryption is not a modern-day invention: historically, the beginnings are very ancient. We look back into the past and explore the methods our ancestors used to exchange secret information and how the procedures have changed until today.
Top 5 Cyberthreats expected in 2020

Top 5 Cyberthreats expected in 2020

What cyberthreats can be expected in the first year of the new decade? Our Head of Product Management, Dr. Yvonne Bernard, gives us an expert assessment what kind of attacks and cybercriminal activities we should have on our radar in 2020.