Thank You

for your request

A special gift for you: The latest Cyberthreat Report

The Cyberthreat Report from Hornetsecurity gives you all the information you need about current cyber threats. Click on the button to read the report right away.

Hornet News

Get the latest information about Internet & Cloud Security. Hornet News subscribers also receive early access to exclusive content such as the Cyberthreat Report.

Latest Blog Posts

Read our latest articles about Internet and Cloud Security. New content every week.
How to Prevent Ransomware Attacks: An Easy-to-Follow Guide

How to Prevent Ransomware Attacks: An Easy-to-Follow Guide

It's been the scourge of businesses globally for several years now, and shows no sign of abating - ransomware, which makes ransomware attack prevention crucial. Not a new threat, but growing in seriousness over the last few years, aided by the ease for the criminals...

The Vulnerability of AI to Cyber Attacks – AI’s Achilles’ Heel

The Vulnerability of AI to Cyber Attacks – AI’s Achilles’ Heel

Artificial Intelligence (AI) attacks are not quite at the level of Skynet depicted in the 1984 film “The Terminator,” but this hasn’t stopped the speculations and real-world implications around AI technological advances. Although the science fiction within “The...

HTML Phishing Asking for the Password Twice

HTML Phishing Asking for the Password Twice

Nothing but the same old threat? Phishing campaigns always seem to proceed by the same principle: A link or attachment placed in an email redirects to a phishing website to retrieve specific data about the recipient. However, for some users, a certain process has now become established that is designed to expose the traditional phishing tactics. Now the Hornetsecurity Security Lab has discovered a phishing scheme that is designed to circumvent this method…
IT Pro Tuesday #298

IT Pro Tuesday #298

Welcome back to IT Pro Tuesday! In the latest Security Swarm Podcast: "Security Risks of Always On Remote Access,” we talk with Matt Lee from Pax8 to discuss the risks associated with deploying always on remote access software on managed endpoints. Matt discusses his...

These customers rely on the services of Hornetsecurity

Kunden Hornetsecurity Cloud Security E-Mail Security