Sophos’ Professionals of Color network is commemorating Hispanic Heritage Month month by sharing some informative online resources and activities for our global team. Contact us today for more information about […]
Continue Reading-
Six months on: Looking back at the role of cyberattacks in the Ukraine War
When Russia invaded Ukraine on February 24th 2022, none of us knew what role cyberattacks might play in a full-scale invasion. Russia had been conducting cyberattacks against Ukraine since it […]
Continue Reading -
A lighter Patch Tuesday, but one heavy with remote code execution bugs
There are fewer bugs in September’s update than in previous months, with RCE vulns making up the bulk of the addressed CVEs Contact us today for more information about SOPHOS […]
Continue Reading -
Sophos ZTNA v1.1 now available
Gateway support for the Microsoft Hyper-V 2016 platform, plus troubleshooting and scalability enhancements. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Security SOS Week 2022 registration is now open!
Back by popular demand, five top security experts are stepping up to the microphone to share their expertise on cybersecurity prevention, detection, incident response, and security operations. Contact us today […]
Continue Reading -
The State of Ransomware in Retail 2022
The retail sector is no exception when it comes to the growing ransomware challenge that other industries face today. Retail saw the second highest rate of ransomware attacks across sectors, […]
Continue Reading -
Sophos Account Health Check
Optimize the health of your endpoints and servers with our intuitive Account Health Check feature. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
An open-source ML toolkit for automatically generating YARA rules
The SophosAI Artificial Intelligence team has developed a machine-learning based tool that generates YARA rules for detecting specific types of threats Contact us today for more information about SOPHOS cyber […]
Continue Reading -
The importance of zero trust network access (ZTNA) in healthcare
With perimeter boundaries quickly blurring thanks to remote care and telehealth, the implicit trust placed in perimeter-centric security makes healthcare dangerously vulnerable. Contact us today for more information about SOPHOS […]
Continue Reading -
Sophos Employee Volunteers at Swiss Mountain Farm
A Sophos employee from our team in Switzerland was able to fulfil a long-term ambition and also assist an alpine farming family. Contact us today for more information about SOPHOS […]
Continue Reading -
Cookie stealing: the new perimeter bypass
As organizations move to cloud services and multifactor authentication, cookies tied to identity and authentication give attackers a new path to compromise. Contact us today for more information about SOPHOS […]
Continue Reading -
Sophos Germany Colleagues Volunteer for Nature Project
A group of employees from the Sophos team in Germany have been volunteering for environmental charity Naturefund. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
ZTNA vs Remote Access VPN
Zero trust network access is a new and better way of providing remote access – without all the frustrations, limitations, and security gaps of remote-access VPN. Contact us today for […]
Continue Reading -
Microsoft squares away 121-CVE Patch Tuesday for August
Another tough month for Azure admins; meanwhile, Windows takes a long road to a Dogwalk Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Lockbit, Hive, and BlackCat attack automotive supplier in triple ransomware attack
After gaining access via RDP, all three threat actors encrypted files, in an investigation complicated by event log clearing and backups. 3 attackers, 2 weeks – 1 entry point. Contact […]
Continue Reading -
The State of Ransomware in Financial Services 2022
The ransomware challenge for the financial services sector continues to grow. Attack rates are up over the last year, with cyber criminals succeeding in encrypting data in over half of […]
Continue Reading
You must be logged in to post a comment.