Fourteen product families affected as 2024 passes an unfortunate milestone Contact us today for more information about SOPHOS cyber security solutions
Continue Reading-
VEEAM exploit seen used again with a new ransomware: “Frag”
Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities of this threat cluster, which recently […]
Continue Reading -
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
The Internet is full of cats—and in this case, malware-delivering fake cat websites used for very targeted search engine optimization. Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats
Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Pacific Rim: What’s it to you?
Thirty-five years after the first great cat-and-mouse infosecurity story, here we are again Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Digital Detritus: The engine of Pacific Rim and a call to the industry for action
Decades of obsolete and unpatched hardware and software endanger us all Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Pacific Rim: Learning to eat soup with a knife
What our incident responders know from five years of fighting an octopus Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
From the frontlines: Our CISO’s view of Pacific Rim
On beyond “Detect and Respond” and “Secure by Design” Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Pacific Rim timeline: Information for defenders from a braid of interlocking attack campaigns
Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos Firewall hardening best practices
Make the most of your Sophos Firewall. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
SophosAI team presents three papers on AI applied to cybersecurity at CAMLIS
On October 24 and 25, SophosAI presents ideas on how to use models large and small—and defend against malignant ones. Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
Addressing the cybersecurity skills shortage in SMBs
While organizations of all sizes are impacted by the shortage of cybersecurity professionals, smaller organizations feel its impact most sharply. Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organizations Worldwide
Building a safer digital future for all. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos Firewall v21 is now available
New innovations and top-requested features. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
From QR to compromise: The growing “quishing” threat
Attackers leverage QR codes in PDF email attachments to spearphish corporate credentials from mobile devices Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos Firewall zero-touch deployment
Deploy the new 2nd Gen XGS Series desktops with zero touch. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.