Cybersecurity Special energy Sector as target of cyberattacks

Hornetsecurity Blog

Get regular updates from the world of cloud security

In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.

Hornetsecurity Podcast
A Journey Through the History of Cryptography – Part 3

A Journey Through the History of Cryptography – Part 3

Our journey through the history of cryptography is coming to an end, but we still have a few last stations ahead of us. First we dealt with symmetric encryption and the encryption methods of Data Encryption Standard (DES) and Advanced Encryption Standard (AES), and in the last blog we introduced asymmetric encryption. In our final piece of the Cryptography triology, we will dive deeper into asymmetric encryption. Attack techniques such as man-in-the-middle attacks and brute force attacks will be examined. Finally, we will present a wide view into the future – keyword: quantum cryptography…
Energy Sector: Number One Cyber-Attack Target

Energy Sector: Number One Cyber-Attack Target

Which industries are most frequently affected by cyber attacks and what attack techniques are they exposed to? By analyzing around 1,000 domains with the largest email volume, the security experts at Hornetsecurity were able to identify the top 10 industries that were particularly targeted by cyber attacks via email in 2019. The energy sector turned out to be extremely threatened, as it is the number one target of attacks.
Awaiting the Inevitable Return of Emotet

Awaiting the Inevitable Return of Emotet

Emotet is probably the most prolific of the recent malware distribution operations. They often change their malware to ensure it is not detected by any anti-virus software. Even though the Emotet botnet is on “spam break” recent changes in a component of the malware has prompted Hornetsecurity’s Security Lab to take a look at the latest version of Emotet in order to be prepared for its next steps. Emotet has added new code obfuscation techniques. But the Security Lab explains how it can still be analyzed…
“Zoom-bombing” Attacks during COVID-19: How can I protect myself?

“Zoom-bombing” Attacks during COVID-19: How can I protect myself?

The video conferencing software Zoom is enjoying enormous popularity because of the current mass practice of working from home. Unfortunately, concerns about the security of the tool have arose. It was possible for uninvolved parties to join other people’s meetings and contribute unwanted or repulsive content – the phenomenon was given the name of “Zoom- bombing”.

Sign Up Hornet News

The new Cyberthreat Report