Hornetsecurity Blog
Get regular updates from the world of cloud security
In our blog, the Hornetsecurity team – especially the experts from the Security Lab – regularly report on IT security topics as well as on current innovations and events at Hornetsecurity.
Hornetsecurity releases 365 Total Protection Plan 4 for Microsoft 365 with AI Recipient Validation that prevents misdirected emails
Hornetsecurity's comprehensive 365 Total Protection Suite had so far provided advanced Email Security and Backup for Microsoft 365 (Plans 1-3). The new 365 Total Protection Compliance & Awareness (Plan 4) is an upgraded solution that additionally delivers...
Disaster Recovery Planning: Key Steps to Mitigate Risks and Protect Your Company’s Data
A solid disaster recovery (DR) plan needs time and attention to form properly. Usually, the total investment closely coincides with the size and scope of the organization. Due to the level of effort, many businesses need help improving their process beyond regular...
Hornetsecurity’s new podcast series helps businesses understand and overcome latest cybersecurity risks
Podcast series ‘The Security Swarm’ explores trending cybersecurity topics Conversations with leading cybersecurity experts open up discussions around AI, compliance and Microsoft 365 Pittsburgh, PA (31 August 2023) - Hornetsecurity has recently launched The Security...
Fortifying Your Fortress with Defense Tactics Against the Golden Ticket Attack
What is Golden Ticket Attack The concept of the Golden Ticket originated from a security researcher and developer named Benjamin Delpy, who is known for creating a powerful post-exploitation tool Mimikatz, a credential dumping utility capable of obtaining plaintext...
Cyber Security Facts You Wish You Knew Earlier
The world of cyber security facts is filled with surprises. Did you know that 95% of breaches are caused by human error? Or that 70%+ of attacks are financially motivated, with less than 5% coming from espionage? It might sound unusual, but these are some of the...
Unlocking the Secrets of Keyloggers: From Input Recording to Cyber Intrusion
The Soviet Union, Plex, and the son of a mob boss don’t seem like they would be associated, but they have one thing in common: keyloggers. A keylogger is software or hardware specifically engineered to monitor and record the keystrokes of a device. The primary intent...
Unveiling Types of Spyware: A Comprehensive Exploration of Various Threats
Spyware Definition - What Is Spyware? Spyware is a type of malware that is secretly installed on a device to covertly collects users’ data, from browsing history to personally identifiable information, sets of credentials, banking details, to email addresses on the...
The Top 5 Spear Phishing Examples and Their Psychological Triggers
What is Phishing?Phishing is one of the popular techniques of social engineering. Attackers send misleading emails or communications while disguising themselves as reputable organizations, such as banks or well-known websites. These communications frequently include...