What happened during the cyber-attack?

................................................................................................................................................................................................

IT security information

Common scams

................................................................................................................................................................................................

Email data

................................................................................................................................................................................................

Media relations and communications

presse (at) haw-hamburg (dot) de

IT security information

Common scams

................................................................................................................................................................................................

Email data

................................................................................................................................................................................................