Neue Suche

Erneute Suche

Ergebnisse:

9

How to respond to a cyberattack: 5 steps to take

It can happen at any time: One click is enough, and the computer is infected, then the network, and then… If the computer freezes or the screen goes black or displays a warning, then something is very wrong. Most likely, it is a cyber attack. But what exactly do you have to do if a cyber attack has been successful and your IT environment is affected, and what legal regulations do you have to observe?

10

OneDrive Personal Links in Email Reply Chain Attacks

Since April 2019, there is a new type of attacks that use emails as an attack vector: the so-called Email Reply Chain Attacks. The first step in these attacks is to spy on emails. The responses to these emails written by the criminals contain a malicious link or attachment. While this method was initially used on a larger scale by Emotet, other threats such as QakBot (aka Qbot or also Quackbot) have also been added over time.

12

Excel as a Malware Launchpad: Danger From XLL Files

Criminals are always finding new ways to distribute malware, and the battle against attacks from the internet is continuously fought. Sometimes the good guys win, but no sooner is one threat defused than the next one pops up. Not only that: ransomware attacks are increasing dramatically. In the current case, the attacks are using XLL files, which are used to install malware on the victims’ computers. What XLL files are, why they are so dangerous and how NoSpamProxy protects you from this threat, you will learn in this blog article.

14

Sender Reputation and Email Security – Part  4: Domain-based Message Authentication, Reporting and Conformance (DMARC)

In the fourth part of our series of articles on sender reputation, we show you how you can use Domain-based Message Authentication, Reporting and Conformance (DMARC) to determine how the receiving server should authenticate your emails and what it should do if authentication fails. In addition, we explain how you can use DMARC to quickly be informed about abuse of your domain and thus protect the reputation of your domain.

16

One year of 32Guards – and that’s just the beginning 

At the turn of the year 2019/2020, the time had come: 32Guards began to send assessments of emails to the participants of the 32Guards beta. Over the course of 2020, the repertoire of detections grew significantly. In this article, we will look back at a number of developments and show how 32Guards became increasingly active, especially in the second half of 2020.