From sophos.com
Cybersecurity as a Service Delivered | Sophos
0 2
We Deliver Superior Cybersecurity Outcomes for Real-World Organizations Worldwide with a Broad Portfolio of Advanced Security Products and Services.
on Fri, 3PM
From sophos.com
Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces
0 3
A sudden disruption of a major phishing-as-a-service provider leads to the rise of another…that looks very familiar
on Thu, 5PM
From sophos.com
Advanced Targeted Malware Threat Protection | Sophos ATP for Network Threat Prevention
0 0
SophosLabs Malware Removal Dashboard Provides Premium Malware Removal and Threat Analysis. Sophos is Trusted by Over 100 Million Users Worldwide.
on Dec 13
From sophos.com
DeepSpeed: a tuning tool for large language models
0 0
SophosAI’s framework for upgrading the performance of LLMs for cybersecurity tasks (or any other specific task) is now open source.
on Dec 13
From sophos.com
The Bite from Inside: The Sophos Active Adversary Report
0 0
A sea change in available data fuels fresh insights from the first half of 2024
on Dec 12
From sophos.com
Keeping it real: Sophos and the 2024 MITRE ATT&CK Evaluations: Enterprise
0 0
Sophos X-Ops looks at the realism of this year’s MITRE ATT&CK Evaluations
on Dec 11
From sophos.com
Network security best practices for the holidays
0 0
Tips to better protect your network while you take some well-deserved time off.
on Dec 11
From sophos.com
Sophos AI to present on how to defang malicious AI models at Black Hat Europe
0 0
“LLMbotomy” research reveals how Trojans can be injected into Large Language Models, and how to disarm them.
on Dec 10
From sophos.com
Now Available: Ansible Collection for Sophos Firewall
0 0
Now Available: Ansible Collection for Sophos Firewall <a id="user-content-now-available-ansible-collection-for-sophos-firewall"...
on Nov 26
From sophos.com
Sophos MDR blocks and tracks activity from probable Iranian state actor “MuddyWater”
0 0
Sophos MDR has observed a new campaign that uses targeted phishing to entice the target to download a legitimate remote machine management tool to dump credentials. We believe with moderate confide…
on Nov 20
From sophos.com
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
0 0
The Internet is full of cats—and in this case, malware-delivering fake cat websites used for very targeted search engine optimization.
on Nov 13
From sophos.com
Pacific Rim timeline: Information for defenders from a braid of interlocking attack campaigns
0 0
Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices
on Nov 9
From sophos.com
VEEAM exploit seen used again with a new ransomware: “Frag”
0 0
Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities of this threat cluster, which recently…
on Nov 8
From sophos.com
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats
0 2
Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices
on Nov 1
From sophos.com
From the frontlines: Our CISO’s view of Pacific Rim
0 0
On beyond “Detect and Respond” and “Secure by Design”
on Oct 31
From sophos.com
Pacific Rim: What’s it to you?
0 0
Thirty-five years after the first great cat-and-mouse infosecurity story, here we are again
on Oct 31
From sophos.com
Digital Detritus: The engine of Pacific Rim and a call to the industry for action
0 0
Decades of obsolete and unpatched hardware and software endanger us all
on Oct 31
From sophos.com
Sophos' Pacific Rim: Defense Against Nation-state Hackers
0 0
Discover Sophos' Pacific Rim defense against nation-state / Chinese hackers Volt Typhoon, APT31, and APT41 targeting critical infrastructure.
on Oct 31
From sophos.com
From QR to compromise: The growing “quishing” threat
0 0
Attackers leverage QR codes in PDF email attachments to spearphish corporate credentials from mobile devices
on Oct 23
From sophos.com
Cybersecurity as a Service Delivered | Sophos
0 0
We Deliver Superior Cybersecurity Outcomes for Real-World Organizations Worldwide with a Broad Portfolio of Advanced Security Products and Services.
on Oct 21
From sophos.com
Sophos announced as inaugural sponsor of The Hacking Games
0 0
Investing in the cybersecurity experts of tomorrow.
on Oct 3
From sophos.com
Political Manipulation with Massive AI Model-driven Misinformation and Microtargeting
0 0
Applying generative AI, bad actors could tailor disinformation campaigns to affect election outcomes on a massive scale with relatively little effort.
on Oct 2
From sophos.com
Cybersecurity as a Service Delivered | Sophos
0 0
We Deliver Superior Cybersecurity Outcomes for Real-World Organizations Worldwide with a Broad Portfolio of Advanced Security Products and Services.
on Oct 1
From sophos.com
Atomic macOS Stealer leads sensitive data theft on macOS
0 0
Sophos X-Ops explores the distribution and capabilities of the Atomic macOS Stealer (AMOS)
on Sep 21
From sophos.com
Crimson Palace returns: New Tools, Tactics, and Targets
0 0
Chinese cyberespionage campaign renews efforts in multiple organizations in Southeast Asia, blending tactics and expanding efforts
on Sep 10
From sophos.com
2024 Ransomware Report: Sophos State of Ransomware
0 0
2024 Ransomware report. Compare your ransomware experiences with those of 3,000 IT professionals across the globe. Free Download.
on Sep 6
From sophos.com
Attack tool update impairs Windows computers
0 1
An EDR killer Sophos X-Ops has tracked for three years continues to bedevil organizations targeted by ransomware gangs.
on Sep 4
From sophos.com
Qilin ransomware caught stealing credentials stored in Google Chrome
0 0
Familiar ransomware develops an appetite for passwords to third-party sites
on Aug 23
From sophos.com
Ransomware attackers introduce new EDR killer to their arsenal
0 0
Sophos discovers the threat actors behind RansomHub ransomware using EDRKillShifter in attacks
on Aug 16
From sophos.com
0 2
The “Mad Liberator” ransomware group leverages social-engineering moves to watch out for
on Aug 13
From sophos.com
Demystifying DoS and DDOS Attacks
0 1
We often hear about DDoS and DoS attacks such as the one that hit Amazon Web Services back in February – which the company says was the largest DDoS attack in recorded history and which it mitigated successfully.
on Aug 13
From sophos.com
The cybersecurity kids aren’t all right
0 2
A new Sophos-commissioned survey finds burnout, fatigue, cynicism riding high in the workforce
on Aug 13
From sophos.com
Sophos MDR hunt tracks Mimic ransomware campaign against organizations in India
0 0
STAC6451 threat cluster targets Internet-exposed Microsoft SQL servers for initial access
on Aug 7
From sophos.com
The Top 10 Ways Ransomware Operators Ramp Up the Pressure to Pay
0 0
Ransomware operators don’t just target systems and data, they target people in their ever-increasing efforts to get the victim to pay
on Aug 6
From sophos.com
Turning the screws: The pressure tactics of ransomware gangs
0 0
Sophos X-Ops examines the increasingly aggressive tactics ransomware gangs use to coerce their targets
on Aug 6
From sophos.com
Driving lessons: The kernel drivers in Sophos Intercept X Advanced
0 0
Operating in kernel-space is necessary, but risky – here’s how we do it in Sophos Intercept X Advanced
on Aug 1
From sophos.com
The State of Ransomware in Critical Infrastructure 2024
0 1
275 IT/cybersecurity leaders from the energy, oil/gas and utilities sector share their ransomware experiences, providing new insights into the business impact of ransomware.
on Jul 18
From sophos.com
G2 Names Sophos a Leader for Endpoint Protection, EDR, XDR, Firewall, and MDR
0 0
Sophos rated a top solution among Firewall and MDR users
on Jul 18
From sophos.com
The State of Ransomware in Retail 2024
0 0
IT and cybersecurity leaders reveal ransomware realities for retail businesses today.
on Jun 28
From sophos.com
The State of Ransomware in Financial Services 2024
0 0
IT and cybersecurity leaders reveal ransomware realities for financial services businesses today.
on Jun 28
From sophos.com
Cyber Insurance and Cyber Defenses 2024: Lessons from IT and Cybersecurity Leaders
0 0
Investing in cyber defenses to optimize your insurance position is a win-win: organizations report easier, cheaper access to cyber coverage as well as improved protection and a reduction in IT work…
on Jun 27
From sophos.com
Effizient und gefährlich: Arbeitsteilung bei chinesischen Hackergruppen
0 0
Sophos veröffentlichte heute seinen Bericht „Operation Crimson Palace: Sophos Threat Hunting Unveils Multiple Clusters of Chinese State-Sponsored Activity Targeting Southeast Asia“, in dem eine hoc…
on Jun 25
From sophos.com
Phishing, BEC attackers target candidates in local election, among others
0 0
An escalating series of email-borne attacks were sent to candidates, including the author
on Jun 24
From sophos.com
RD Web Access abuse: Fighting back
0 0
Investigation insights and recommendations from a recent welter of incident-response cases
on Jun 24
From sophos.com
0 0
Threat clusters targeted a government agency for cyberespionage in a campaign that had precursors dating back to early 2022.
on Jun 6
From sophos.com
Operation Crimson Palace: A Technical Deep Dive
0 0
Sophos Managed Detection and Response initiated a threat hunt across all customers after the detection of abuse of a vulnerable legitimate VMware executable (vmnat.exe) to perform dynamic link libr…
on Jun 6
From sophos.com
Why you can’t trust password strength meters
0 0
Website owners can employ a range of measures to help users choose better, stronger passwords and one of the most popular techniques is to include a password strength meter. The meters are designed…
on May 14
From sophos.com
Sophos Incident Response achieves NCSC Certified Incident Response (CIR) Level 2 status
0 0
I am delighted to announce that the Sophos Incident Response service has been awarded U.K.’s National Cyber Security Centre (NCSC) Cyber Incident Response (CIR) Level 2 status by CREST. This assura…
on May 14
From sophos.com
Extracting data from encrypted virtual disks: six methods
0 0
For incident responders, a variety of techniques for information retrieval from locked-up VMs
on May 14