IT Security Information

Get regular updates on current threats such as ransomware, phishing, CEO fraud and business email compromise.

A Journey Through the History of Cryptography – Part 3

A Journey Through the History of Cryptography – Part 3

Our journey through the history of cryptography is coming to an end, but we still have a few last stations ahead of us. First we dealt with symmetric encryption and the encryption methods of Data Encryption Standard (DES) and Advanced Encryption Standard (AES), and in the last blog we introduced asymmetric encryption. In our final piece of the Cryptography triology, we will dive deeper into asymmetric encryption. Attack techniques such as man-in-the-middle attacks and brute force attacks will be examined. Finally, we will present a wide view into the future – keyword: quantum cryptography…
Energy Sector: Number One Cyber-Attack Target

Energy Sector: Number One Cyber-Attack Target

Which industries are most frequently affected by cyber attacks and what attack techniques are they exposed to? By analyzing around 1,000 domains with the largest email volume, the security experts at Hornetsecurity were able to identify the top 10 industries that were particularly targeted by cyber attacks via email in 2019. The energy sector turned out to be extremely threatened, as it is the number one target of attacks.
Awaiting the Inevitable Return of Emotet

Awaiting the Inevitable Return of Emotet

Emotet is probably the most prolific of the recent malware distribution operations. They often change their malware to ensure it is not detected by any anti-virus software. Even though the Emotet botnet is on “spam break” recent changes in a component of the malware has prompted Hornetsecurity’s Security Lab to take a look at the latest version of Emotet in order to be prepared for its next steps. Emotet has added new code obfuscation techniques. But the Security Lab explains how it can still be analyzed…
“Zoom-bombing” Attacks during COVID-19: How can I protect myself?

“Zoom-bombing” Attacks during COVID-19: How can I protect myself?

The video conferencing software Zoom is enjoying enormous popularity because of the current mass practice of working from home. Unfortunately, concerns about the security of the tool have arose. It was possible for uninvolved parties to join other people’s meetings and contribute unwanted or repulsive content – the phenomenon was given the name of “Zoom- bombing”.
HTML Phishing Asking for the Password Twice

HTML Phishing Asking for the Password Twice

Nothing but the same old threat? Phishing campaigns always seem to proceed by the same principle: A link or attachment placed in an email redirects to a phishing website to retrieve specific data about the recipient. However, for some users, a certain process has now become established that is designed to expose the traditional phishing tactics. Now the Hornetsecurity Security Lab has discovered a phishing scheme that is designed to circumvent this method…

Sign Up Hornet News

The new Cyberthreat Report