Our journey through the history of cryptography is coming to an end, but we still have a few last stations ahead of us. First we dealt with symmetric encryption and the encryption methods of Data Encryption Standard (DES) and Advanced Encryption Standard (AES), and in the last blog we introduced asymmetric encryption. In our final piece of the Cryptography triology, we will dive deeper into asymmetric encryption. Attack techniques such as man-in-the-middle attacks and brute force attacks will be examined. Finally, we will present a wide view into the future – keyword: quantum cryptography…
Hornetsecurity’s Security Lab presents insights into a long running information stealer campaign targeting German HR contacts with fake CV files.
Which industries are most frequently affected by cyber attacks and what attack techniques are they exposed to? By analyzing around 1,000 domains with the largest email volume, the security experts at Hornetsecurity were able to identify the top 10 industries that were particularly targeted by cyber attacks via email in 2019. The energy sector turned out to be extremely threatened, as it is the number one target of attacks.
TrickBot is one of the most productive malware used in corona malware campaigns and sent to Microsoft 365 users via email. Hornetsecurity therefore explains how TrickBot attacks behave and how to protect against them.
Emotet is probably the most prolific of the recent malware distribution operations. They often change their malware to ensure it is not detected by any anti-virus software. Even though the Emotet botnet is on “spam break” recent changes in a component of the malware has prompted Hornetsecurity’s Security Lab to take a look at the latest version of Emotet in order to be prepared for its next steps. Emotet has added new code obfuscation techniques. But the Security Lab explains how it can still be analyzed…
The video conferencing software Zoom is enjoying enormous popularity because of the current mass practice of working from home. Unfortunately, concerns about the security of the tool have arose. It was possible for uninvolved parties to join other people’s meetings and contribute unwanted or repulsive content – the phenomenon was given the name of “Zoom- bombing”.
The remote code execution (RCE) vulnerability in Apple’s default email app is known to Hornetsecurity’s Security Lab. Right now the Security Lab is in discovery mode. In first analyses the vulnerabilty could not be detected in any email from the last six months received through Hornetsecurity’s globally distributed honeypots.
Hornetsecurity reported an annual growth in recurring sales of 68 % for the past year. Once again the Email Cloud Security Provider exceeds expectations and as one of the fastest-growing German technology companies is therefore well prepared for the current challenging situation.