IT Security Information

Get regular updates on current threats such as ransomware, phishing, CEO fraud and business email compromise.

Energy Sector: Number One Cyber-Attack Target

Energy Sector: Number One Cyber-Attack Target

Which industries are most frequently affected by cyber attacks and what attack techniques are they exposed to? By analyzing around 1,000 domains with the largest email volume, the security experts at Hornetsecurity were able to identify the top 10 industries that were particularly targeted by cyber attacks via email in 2019. The energy sector turned out to be extremely threatened, as it is the number one target of attacks.
“Zoom-bombing” Attacks during COVID-19: How can I protect myself?

“Zoom-bombing” Attacks during COVID-19: How can I protect myself?

The video conferencing software Zoom is enjoying enormous popularity because of the current mass practice of working from home. Unfortunately, concerns about the security of the tool have arose. It was possible for uninvolved parties to join other people’s meetings and contribute unwanted or repulsive content – the phenomenon was given the name of “Zoom- bombing”.
HTML Phishing Asking for the Password Twice

HTML Phishing Asking for the Password Twice

Nothing but the same old threat? Phishing campaigns always seem to proceed by the same principle: A link or attachment placed in an email redirects to a phishing website to retrieve specific data about the recipient. However, for some users, a certain process has now become established that is designed to expose the traditional phishing tactics. Now the Hornetsecurity Security Lab has discovered a phishing scheme that is designed to circumvent this method…
Office 365- is ‘Account Hijacking’ the number 1 security risk?

Office 365- is ‘Account Hijacking’ the number 1 security risk?

Microsoft is considered as the major driver of the cloud movement and has brought the world’s most used office suite into the cloud with Office 365. But users of the cloud service are more and more in the centre of cybercriminal activities. Most recently, Microsoft reported a 250 percent increase in targeted attacks on Office 365 accounts. The technology company integrated various security mechanisms to defend against malware and other threats. But are these really sufficient for comprehensive security?
Formjacking – The New Invisible Threat in Cyberspace

Formjacking – The New Invisible Threat in Cyberspace

Christmas is just around the corner and it is already certain that some people will lose their holiday spirit. When millions of people go online on a gift hunt, the trap snaps shut. We are talking about the new invisible threat on the Internet: Formjacking, also known as e-skimming. Hackers are stealing credit card and bank details from online shops with hijacked payment forms…
The hacker: made in Hollywood?

The hacker: made in Hollywood?

A hacker is smart, much smarter than the average. With just a few clicks and a few key combinations, he’s hacked into the IT systems of governments, public authorities and large corporations. He avoids the public and acts in secret – that’s how it’s portrayed in Hollywood movies. But the profile of computer geniuses is much more diverse than expected…