Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Mastering and Leveraging the MITRE ATT&CK Framework on Cyber Threat Detection
History of MITRE ATTACK Framework The requirement to track and catalog typical TTPs (Tactics, Techniques, and Procedures) that APT (Advanced Persistent Threat) organizations used against business Windows networks was first addressed by MITRE in 2013. FMX (Fort Meade...
Unraveling RTO vs. RPO: Key Factors in Disaster Preparedness
With sufficient funding and infrastructure, any system could theoretically achieve near-constant uptime through any situation. Reality dictates a more conservative outlook. To establish a workable budget and a practical plan, you will need to determine your...
ALMOST 60% OF BUSINESSES ARE ‘VERY’ TO ‘EXTREMELY’ CONCERNED ABOUT RANSOMWARE ATTACKS – HORNETSECURITY ANNUAL RANSOMWARE SURVEY
More than half of leadership teams are ‘actively involved’ in decision-making on preventing attacks One in five respondents said their company suffered an attack in 2023 Nuremberg, Germany (10 October 2023) – Nearly 60% of companies are ‘very’ to ‘extremely’ concerned...
Malware vs. Viruses: Understanding the Threat Landscape
There is a misconception about what malware and viruses are. Many people use it interchangeably, however, they are two different things. Malware is any malicious software that has a goal to harm someone's data or systems. The virus is just a type of malware. In this...
Monthly Threat Report October 2023
Introduction The Monthly Threat Report by Hornetsecurity brings you monthly insights into M365 security trends, email-based threats, and commentary on current events in the cybersecurity space. This edition of the Monthly Threat Report focuses on data from the month...
How to Air-Gap and Isolate Your Backups
In this article, following on from How to Secure and Protect Backup Data, we look at how to isolate your backups using air-gapping, firewall, performing risk analysis for your backup strategy, encrypting backups for additional protection and round off with some...
Human Vulnerabilities – Exploring Types of Social Engineering Attacks
It’s Monday morning; you have a fresh cup of coffee in hand and are ready to check the emails from the weekend. A new email has arrived in just the last hour from the CFO requesting the immediate payment of an attached overdue invoice missed by the finance team. A...
Why You Still Need On-Prem Backup in The Cloud Era
Cloud technologies have fundamentally altered how we leverage computing resources. From software packages that require no maintenance by the customer to machine learning, the cloud gives us new ways to solve challenges. Unfortunately, it also introduces new problems,...