Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Hornetsecurity Earns Frost & Sullivan’s 2024 EMEA Company of the Year Award for Pioneering Cloud-Based Email Security
Hornetsecurity’s comprehensive cloud-based solutions protect email communications, secure data, and ensure business continuity, driving innovation and customer satisfaction Pittsburgh, PA (July 1 2024) - Frost & Sullivan has announced that it recognizes...
Russia’s Notorious History of Hacking the Olympic Games
As the world eagerly anticipates the upcoming Olympic Games in Paris, it's crucial to address a persistent and increasingly sophisticated threat: cyberattacks. Russia, in particular, has a notorious history of targeting the Olympics with various forms of cyber...
Next Phase of AI in Cybersecurity
Artificial Intelligence and Cybersecurity Artificial intelligence, commonly known as AI has been around since the 1950s. However, its growth has surged in years due, to advancements in computer technology that have made it more accessible to a range of organizations....
What the Change Healthcare Cyber Attack Means for the US Healthcare Industry
It’s time to get serious about securing healthcare systems, solutions, and data! Cybersecurity in the health sector needs urgent care—followed by long-term therapy. Cyber-attacks are on the rise in this vulnerable sector: wreaking financial havoc, posing national...
Impact of AI on Cyber Security
Accepting AI's Place in Cybersecurity Businesses that embrace technology will have a bright future since the world is changing at an accelerated rate. Entertainment, new products, and business are just a few of the domains where digitization has quickened development....
Darkgate Pastejacking – Analysis and Breakdown of the Attack Chain
Introduction Vade's Threat Intelligence and Response Center - (now part of Hornetsecurity!) recently observed a number of malicious phishing campaigns distributing Darkgate using an unusual technique called Pastejacking. DarkGate is a sophisticated and evolving...
Understanding Email Security Technologies and the Power of Hornetsecurity’s Hybrid Approach
Email delivered threats such as phishing, malware attachments and Business Email Compromise (BEC) are still the number one favorite attack vector for cyber criminals. And they’re not letting up, with new flavors of attacks being tested every day. It just takes one...