Much has been written lately about Emotet and the consequences that an infestation with this banking Trojan can have. Among other things, public institutions have had and are struggling with the consequences of successful cyberattacks that have polluted and crippled their respective IT infrastructures, with sometimes catastrophic consequences. The Berlin Chamber Court is perhaps the best-known example, as large amounts of data could probably be stolen over several days. A real IT total damage. We have already explained how you and your company can protect yourself from emotet elsewhere.
But what does an emotet email actually look like? Three concrete examples show how authentic emotet emails now look. All three examples have been reported to us and have only been anonymized by us to the extent necessary for data protection reasons.
Price advantage for the replacement of Symantec Mail Security products
All Topics, News, ProductThe time of waiting is over! It’s been over six months since Broadcom acquired Symantec products – including the Symantec Mail Security products – originally developed mostly by Brightmail and one of the most popular mail security products. Customers and resellers complain about problems to extend existing licenses, new functions are hardly or not at […]
When the QakBot rings twice
All Topics, News, NoSpamProxy ProtectionIt is not always nice to see old friends again. Especially not when they ring the doorbell at half past five in the morning, rummage through your entire house and then let in a whole gang of acquaintances who rob you. One way or another, the Malware QakBot – also known as QBot or Pinkslipbot-, which was first discovered in 2007 and has been reappearing in increasing numbers for several months.
How healthcare institutions protect themselves against cyber attacks
All Topics, News, NoSpamProxy ProtectionSince 2019, public authorities, universities and healthcare institutions have increasingly become the target of hacking attacks. The Berlin Court of Appeal, the University of Gießen and the Hospital of Fürth are only the best-known victims of cyber criminals. And they have two things in common: in all cases the IT infrastructures were infected with the malware Emotet, and the consequences of all infections were catastrophic.
New version NoSpamProxy 13.2
All TopicsVersion 13.2 includes new features and important functional enhancements. One of the highlights of the new version is the automated certificate management for users of the German National Research and Education Network (DFN). The new Release 13.2 of NoSpamProxy automates the use of the DFN CA. When a new user is created, NoSpamProxy automatically retrieves […]
CxO Fraud and Corona Pandemic: How to Protect Yourself
All Topics, NoSpamProxy ProtectionSince the beginning of the Corona pandemic at the end of 2019, cybercriminals have been exploiting fears of the Corona virus to spread malicious code via email. The criminals are doing this, for example, by establishing a relationship with the Corona virus in the contaminated emails, arguing emotionally or claiming a particular urgency. Many of the sensitized recipients fall for it, causing the entire IT network to become infected and allowing malware and ransomware to be spread unhindered.
Email security when working from home
All Topics, News, NoSpamProxy ProtectionThe lung disease Covid-19 caused by the coronavirus SARS-CoV-2 has presented new challenges for society and people worldwide. Contact barriers, masks, closed shops, cancellations of events and cinema closures are just some of the consequences that have shaken up the everyday life that we have all taken for granted. Many people are particularly aware of the importance of social contacts and meetings in this time of crisis.
Inside Emotet: 3 current examples and how Project 32Guards can protect you
32Guards, 32Guards, All Topics, News, NoSpamProxy Protection, ProductMuch has been written lately about Emotet and the consequences that an infestation with this banking Trojan can have. Among other things, public institutions have had and are struggling with the consequences of successful cyberattacks that have polluted and crippled their respective IT infrastructures, with sometimes catastrophic consequences. The Berlin Chamber Court is perhaps the best-known example, as large amounts of data could probably be stolen over several days. A real IT total damage. We have already explained how you and your company can protect yourself from emotet elsewhere.
But what does an emotet email actually look like? Three concrete examples show how authentic emotet emails now look. All three examples have been reported to us and have only been anonymized by us to the extent necessary for data protection reasons.
That is why public institutions are the main targets of cyber attacks
32Guards, 32Guards, All Topics, News, NoSpamProxy ProtectionA large number of cyber attacks hit public institutions and authorities in 2019. The administration of the city of Frankfurt am Main, the Berlin Chamber Court and the administration of Neustadt am Rübenberge are just three examples that show the catastrophic consequences that an infestation with malware can have for authorities. In all these cases, it was the banking Trojan Emotet – the most dangerous malware in the world at the moment, according to the Federal Ministry for Information Security (BSI) – that was able to paralyze these authorities and in some cases still does so.