Using changing remote content, apps slide by official review process to deliver fraud through the Apple App Store and Google Play Store. Contact us today for more information about SOPHOS […]
Continue Reading-
Introducing Sophos Network Detection and Response (NDR)
Sophos NDR identifies rogue assets, unprotected devices, insider threats, and novel attacks to accelerate threat detection and response. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos ZTNA-as-a-Service is now available
This latest release of our ZTNA platform makes deployment even easier and security even stronger. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
January 2023 patch roundup: Microsoft tees up 98 updates
Adobe greets the new year with patches for 18 vulns in Reader, Acrobat, and others; sun sets on the last of Win7, 8, RT support Contact us today for more […]
Continue Reading -
The scammers who scam scammers on cybercrime forums: Part 4
A shadowy sub-economy is more than just a curiosity – it’s booming business, and also an opportunity for defenders. In the fourth and final part of our series, we look […]
Continue Reading -
The scammers who scam scammers on cybercrime forums: Part 3
A shadowy sub-economy is more than just a curiosity – it’s booming business, and also an opportunity for defenders. In the third part of our series, we look at the […]
Continue Reading -
Signed driver malware moves up the software trust chain
The criminals signed their AV-killer malware, closely related to one known as BURNTCIGAR, with a legitimate WHCP certificate Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
The scammers who scam scammers on cybercrime forums: Part 1
A shadowy sub-economy is more than just a curiosity – it’s booming business, and also an opportunity for defenders. In the first of a four-part series, we look at the […]
Continue Reading -
Sophos MDR service now integrates vendor agnostic telemetry
Our analysts can now detect and respond to advanced, human-led attacks across the entire security environment using the Sophos and third-party tools organizations already have in place. Contact us today […]
Continue Reading -
LockBit 3.0 ‘Black’ attacks and leaks reveal wormable capabilities and tooling
Reverse-engineering reveals close similarities to BlackMatter ransomware, with some improvements Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos Firewall v19.5 is now available
Sophos Firewall OS v19.5 is a free upgrade for all licensed Sophos Firewall customers. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos 2023 Threat Report: the continued evolution of “Crime-as-a-Service”
Maturing marketplaces, capabilities-for-hire continue to proliferate professional tools, techniques and practices across the threat spectrum. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos earns perfect scores in SE Labs endpoint protection report
Sophos earns 100% total protection for endpoint security Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Family Tree: DLL-Sideloading Cases May Be Related
A threat actor’s repeated use of DLL-hijack execution flow makes for interesting attack results, including omnivorous file ingestion; we break down five cases and find commonalities Contact us today for […]
Continue Reading -
Sophos MDR Launches Compatibility with Third-Party Cybersecurity Technologies
Further extending threat detection and response through integrations with third-party endpoint, cloud, identify, email, firewall and network solutions Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Are threat actors turning to archives and disk images as macro usage dwindles?
Following Microsoft’s announcement that macros from the internet will be disabled by default, threat actors are using alternative file types for malware delivery. This shift brings both challenges and opportunities […]
Continue Reading
You must be logged in to post a comment.