Attackers don’t break in — they log in. That shift has made identity the new perimeter of modern cybersecurity. Every enterprise wrestles with the same challenge: a constantly changing identity […]
Continue Reading-
Infostealers: The silent doorway to identity attacks — and why proactive defense matters
Credential theft isn’t just an inconvenience. It’s often the first move in a chain reaction that ends in full-scale compromise. Beyond the dreaded password reset process, information stealers, as shown […]
Continue Reading -
Case Study: University of West England uses Sophos solutions to protect thousands of students across multiple campuses
At the University of the West of England (UWE Bristol), cybersecurity plays a critical role in ensuring uninterrupted education for 38,000 students spread across multiple campuses. Facing limited visibility and […]
Continue Reading -
Sophos named a Leader in the KuppingerCole 2025 Leadership Compass for Email Security
Click to enlarge We’re excited to announce that Sophos has been named a Leader across all four evaluation categories — Overall, Product, Innovation, and Market — in the 2025 KuppingerCole […]
Continue Reading -
November Patch Tuesday does its chores
Microsoft on Tuesday announced 63 patches affecting 13 product families. Four of the addressed issues are considered by Microsoft to be of Critical severity, and nine have a CVSS base […]
Continue Reading -
Sophos Firewall v22: Your top-requested features
In the last few articles on the topic of our latest Sophos Firewall release, we’ve discussed many of the important enhancements to Secure by Design in Sophos Firewall v22. You […]
Continue Reading -
Defending the future: Our commitment to responsible AI in cybersecurity
In the rapidly evolving landscape of cyber threats, artificial intelligence is no longer a luxury: it’s a necessity. At Sophos, we recognized this reality early: we’ve been integrating sophisticated AI […]
Continue Reading -
Faster, safer, stronger: Sophos Firewall v22 security enhancements
In the last few articles on the topic of our latest Sophos Firewall release, we’ve discussed the importance of Secure by Design and covered one of the highlights of this […]
Continue Reading -
5 ways to strengthen your firewall and endpoint’s defenses against ransomware
Ransomware attacks are evolving faster than ever. For already stretched IT and security teams, staying ahead can feel impossible, but it doesn’t have to be. The right combination of firewall […]
Continue Reading -
Detecting fraudulent North Korean hires: A CISO playbook
The North Korean worker scheme has expanded into a global threat. Although it originally focused on U.S. technology companies, the scheme has spread to other regions and sectors, including finance, […]
Continue Reading -
Phake phishing: Phundamental or pholly?
On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines: sports, the military, transport, crisis preparedness, […]
Continue Reading -
BRONZE BUTLER exploits Japanese asset management software vulnerability
In mid-2025, Counter Threat Unit™ (CTU) researchers observed a sophisticated BRONZE BUTLER campaign that exploited a zero-day vulnerability in Motex LANSCOPE Endpoint Manager to steal confidential information. The Chinese state-sponsored […]
Continue Reading -
Build a prevention-first defense: The Sophos Cybersecurity Toolkit
Ransomware remains one of today’s most disruptive cyber threats, but it is far from the only one. Attackers are also exploiting unpatched systems, launching AI-driven phishing campaigns, and using stolen […]
Continue Reading -
Windows Server Update Services (WSUS) vulnerability abused to harvest sensitive data
Counter Threat Unit™ (CTU) researchers are investigating exploitation of a remote code execution vulnerability (CVE-2025-59287) in Microsoft’s Windows Server Update Service (WSUS), a native IT management tool for Windows systems […]
Continue Reading -
Sophos Firewall v22: Health Check
Sophos Firewall v22 is now in early access and the participation has been outstanding. One of the highlights of this release is the new Health Check feature. This is just […]
Continue Reading -
Locking it down: A new technique to prevent LLM jailbreaks
Many organizations are increasingly deploying large language models (LLMs) such as OpenAI’s GPT series, Anthropic’s Claude, Meta’s LLaMA, and various models from DeepSeek, with minimal customization. This widespread reuse leads […]
Continue Reading
You must be logged in to post a comment.