Email Threat Review August 2022

Contents In this monthly email threat review instalment, we present an overview of the email-based threats observed in August 2022 and compare them to the previous month’s threats. The report provides insights into: Unwanted emails by category File types used in...

Identifying file manipulation in system files

Sometimes people send files to us that seem to be legitimate Microsoft system files at first glance, yet closer inspection reveals, that they have in fact been modified. Are those manipulations always malicious? And how can file manipulations be identified? Here are...

Control Panel Version 6.30.1.0

Enhancements In the “Deny & Allow Lists” module, it is now possible to enter subdomains in order to bypass the URL Rewriting filter. As a security measure against possible user errors, the user must now enter the name of the customer or partner to be...

Hornetsecurity Announces Strategic Growth Investment from TA

TA joins existing investors PSG and Verdane in a co-control partnership alongside the Hornetsecurity management team   HANOVER, Germany; September 6 2022 – Hornetsecurity (the “Company”), a leading international cloud security and compliance SaaS provider,...