Attackers don’t break in — they log in. That shift has made identity the new perimeter of modern cybersecurity. Every enterprise wrestles with the same challenge: a constantly changing identity […]
Continue Reading-
Infostealers: The silent doorway to identity attacks — and why proactive defense matters
Credential theft isn’t just an inconvenience. It’s often the first move in a chain reaction that ends in full-scale compromise. Beyond the dreaded password reset process, information stealers, as shown […]
Continue Reading -
Case Study: University of West England uses Sophos solutions to protect thousands of students across multiple campuses
At the University of the West of England (UWE Bristol), cybersecurity plays a critical role in ensuring uninterrupted education for 38,000 students spread across multiple campuses. Facing limited visibility and […]
Continue Reading -
November Patch Tuesday does its chores
Microsoft on Tuesday announced 63 patches affecting 13 product families. Four of the addressed issues are considered by Microsoft to be of Critical severity, and nine have a CVSS base […]
Continue Reading -
Sophos Firewall v22: Your top-requested features
In the last few articles on the topic of our latest Sophos Firewall release, we’ve discussed many of the important enhancements to Secure by Design in Sophos Firewall v22. You […]
Continue Reading -
Detecting fraudulent North Korean hires: A CISO playbook
The North Korean worker scheme has expanded into a global threat. Although it originally focused on U.S. technology companies, the scheme has spread to other regions and sectors, including finance, […]
Continue Reading -
Phake phishing: Phundamental or pholly?
On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines: sports, the military, transport, crisis preparedness, […]
Continue Reading -
BRONZE BUTLER exploits Japanese asset management software vulnerability
In mid-2025, Counter Threat Unit™ (CTU) researchers observed a sophisticated BRONZE BUTLER campaign that exploited a zero-day vulnerability in Motex LANSCOPE Endpoint Manager to steal confidential information. The Chinese state-sponsored […]
Continue Reading -
Build a prevention-first defense: The Sophos Cybersecurity Toolkit
Ransomware remains one of today’s most disruptive cyber threats, but it is far from the only one. Attackers are also exploiting unpatched systems, launching AI-driven phishing campaigns, and using stolen […]
Continue Reading -
Windows Server Update Services (WSUS) vulnerability abused to harvest sensitive data
Counter Threat Unit™ (CTU) researchers are investigating exploitation of a remote code execution vulnerability (CVE-2025-59287) in Microsoft’s Windows Server Update Service (WSUS), a native IT management tool for Windows systems […]
Continue Reading -
Locking it down: A new technique to prevent LLM jailbreaks
Many organizations are increasingly deploying large language models (LLMs) such as OpenAI’s GPT series, Anthropic’s Claude, Meta’s LLaMA, and various models from DeepSeek, with minimal customization. This widespread reuse leads […]
Continue Reading -
We need secure products as much as we need security products
Recent events with F5 and SonicWall underline a continuing issue: network infrastructure is constantly under attack, and the cybersecurity industry continues to grapple with deep product security challenges. Our adversaries […]
Continue Reading -
Introducing Sophos Identity Threat Detection and Response (ITDR)
Adversaries exploit compromised identities, infrastructure weaknesses, and misconfigurations to gain unauthorized access to sensitive data and systems, putting user-based access and controls at the frontline of modern IT and cybersecurity. […]
Continue Reading -
Getting salty with LLMs: SophosAI unveils new defense against jailbreaking at CAMLIS 2025
Scientists from the SophosAI team will present their research at the upcoming Conference on Applied Machine Learning in Information Security (CAMLIS) in Arlington, Virginia. On October 23, Senior Data Scientist […]
Continue Reading -
Announcing the latest evolution of our Security Operations portfolio
Today, we’ve announced significant enhancements to our Security Operations portfolio, already trusted by 75,000 organizations worldwide via Sophos XDR and Sophos MDR offerings. This marks a major milestone in our […]
Continue Reading -
From inbox clutter to costly compromise: Why email threats still matter
When people think of cyber threats today, ransomware tends to dominate the conversation. It’s flashy, destructive, and grabs headlines. But ransomware rarely arrives on its own. More often than not, […]
Continue Reading
You must be logged in to post a comment.