IT Security Information

Get regular updates on current threats such as ransomware, phishing, CEO fraud and business email compromise.

Security Information

HTML Phishing Asking for the Password Twice

Nothing but the same old threat? Phishing campaigns always seem to proceed by the same principle: A link or attachment placed in an email redirects to a phishing website to retrieve specific data about the recipient. However, for some users, a certain process has now become established that is designed to expose the traditional phishing tactics. Now the Hornetsecurity Security Lab has discovered a phishing scheme that is designed to circumvent this method…
Security Information

Security gaps in the home office? The challenge of IT security in times of crisis

The number of coronavirus infections are increasing each day, which has resulted in drastic countermeasures. Shops, restaurants and other public places are staying closed to prevent the spread of the virus. Companies are asking their employees to work from their homes. During this extraordinary and sometimes overwhelming situation, companies and employees should not have to face additional fears about IT security in the home office. Hornetsecurity has some recommendations for this.
Security Information

Mysterious spam campaign: A security analysis

A recent case has not only puzzled researchers at Hornetsecurity Security Lab, but also other security analysts: In a current email spam campaign in which malicious Excel documents are delivered in zipped archives, only the Windows calculator application ultimately starts when the analysis is performed on the security experts’ computers. Our Security Lab uncovers what exactly lies behind the scam and what possible target the attackers are trying to exploit.
Security Information

A journey through the history of cryptography – Part 1

The implementation of encryption strategies in companies is becoming increasingly popular. The strongest driver of this process is the ratification of the GDPR in May 2018, but encryption is not a modern-day invention: historically, the beginnings are very ancient. We look back into the past and explore the methods our ancestors used to exchange secret information and how the procedures have changed until today.

Sign Up Hornet News

The new Cyberthreat Report