Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Hornetsecurity’s Cyber Security Report 2024 is here!
Every year we at the Security Lab here at Hornetsecurity sift through billions of emails from every year and analyze the data to provide actionable insights to cyber defenders everywhere. This article serves as your appetizer for the main course, the free report which...
USE OF MALICIOUS WEB LINKS IN EMAILS HAS RISEN BY 144% IN 2023 – NEW HORNETSECURITY REPORT
Hornetsecurity’s Cyber Security Report 2024 reveals phishing remains top email threat, accounting for 43.3% of attacks, but malicious URLs jumped from 12.5% to 30.5% YoY Analysis of more 45 billion emails reveals more than a third (36.4%) are unwanted Pittsburgh, PA...
The Pros and Cons of All Backup Storage Targets Explained
The days of tape-only solutions have come to an end. Other media have caught up to it in cost, capacity, convenience, and reliability. You now have a variety of storage options. Backup applications that can only operate with tape have little value in modern business...
The Foolproof Method of Maintaining your Backup System
As you might expect, setting up backup is just the beginning. You will need to keep it running into perpetuity. Similarly, you cannot simply assume that everything will work. You need to keep constant vigilance over the backup system, its media, and everything that it...
Monthly Threat Report November 2023: Holiday Email Threat Increases and More Zero-Days
What Are Insider Threats? Definition, Types, and Mitigation Tactics
What Is an Insider Threat? An insider threat is like a wolf in sheep’s clothing. Outwardly, they appear just like any other trusted member of your enterprise, but inside, they have the potential and agenda to destroy whole infrastructures or manipulate data for their...
Bypassing Authentication A Comprehensive Guide to Pass-the-Hash Attacks
No, this guide does not relate to any sort of attack on potato hash or anything to do with the passing of other versions of hash. This is a brief peek behind the curtain on how a hacker might exploit your account to gain privileged access to your environment with a...
How to Get the Absolute Most Out of Your Backup Software
In the past, we could not capture a consistent backup. Operations would simply read files on disk in order as quickly as possible. But, if a file changed after the backup copied it but before the job completed, then the backup’s contents were inconsistent. If another...