The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in July and August, CTU™ researchers identified the following noteworthy issues […]
Continue Reading-
October Patch Tuesday beats January ’25 record
Microsoft on Tuesday announced 170 patches affecting 21 product families. Eight of the addressed issues are considered by Microsoft to be of Critical severity, and 18 have a CVSS base […]
Continue Reading -
F5 network compromised
On October 15, 2025, F5 reported that a nation-state threat actor had gained long-term access to some F5 systems and exfiltrated data, including source code and information about undisclosed product […]
Continue Reading -
WhatsApp Worm Targets Brazilian Banking Customers
Counter Threat Unit™ (CTU) researchers are investigating multiple incidents in an ongoing campaign targeting users of the WhatsApp messaging platform. The campaign, which started on September 29, 2025, is focused […]
Continue Reading -
HeartCrypt’s wholesale impersonation effort
Over the past year and a bit more, we’ve monitored a constellation of events that share a set of general attributes: Malware impersonating, subverting, and embedding itself in legitimate software […]
Continue Reading -
What happens when a cybersecurity company gets phished?
If you work in cybersecurity, you’ve probably heard the time-honored adage about cyber attacks: “It’s not a matter of if, but when.” Perhaps a better way to think of it […]
Continue Reading -
K-12 schools face cybersecurity risks inside and outside of the classroom
Phishing was the most common access vector for ransomware infections at lower education institutions over the past year As schools continue to expand their digital footprint, the threat of phishing, […]
Continue Reading -
GOLD SALEM’s Warlock operation joins busy ransomware landscape
Counter Threat Unit™ (CTU) researchers are monitoring a threat group that refers to itself as Warlock Group. The group, which CTU™ researchers track as GOLD SALEM, has compromised networks and […]
Continue Reading -
Not all Endpoint protection is created equal
If you’re evaluating endpoint protection, you’ve likely noticed something: Everything starts to sound the same. “AI-powered.” “Next-gen.” “Integrated.” These claims are everywhere. And with over 90% of organizations now using […]
Continue Reading -
September Patch Tuesday handles 81 CVEs
.Microsoft on Tuesday announced 81 patches affecting 15 product families. Nine of the addressed issues are considered by Microsoft to be of Critical severity, and nine have a CVSS base […]
Continue Reading -
New enhancements to the Sophos AI Assistant
We’re pleased to announce new features to the Sophos AI Assistant, which puts easier case triage and investigation, MDR-grade expertise, guided workflows, and real-time threat hunting directly in the hands […]
Continue Reading -
Defend what matters: Introducing Sophos Endpoint for Legacy Platforms
Legacy operating systems that have reached end-of-support often lack security features and updates that are present in newer systems, making them targets for exploitation by adversaries. However, organizations within industries […]
Continue Reading -
Velociraptor incident response tool abused for remote access
In August 2025, Counter Threat Unit™ (CTU) researchers investigated an intrusion that involved deployment of the legitimate open-source Velociraptor digital forensics and incident response (DFIR) tool. In this incident, the […]
Continue Reading -
Threat Intelligence Executive Report – Volume 2025, Number 4
This issue of the Counter Threat Unit’s high-level bimonthly report discusses noteworthy updates in the threat landscape during May and June Contact us today for more information about SOPHOS cyber […]
Continue Reading -
August Patch Tuesday includes blasts from the (recent) past
Microsoft haul this month covers 109 CVEs… more or less Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos AI at Black Hat USA ’25: Anomaly detection betrayed us, so we gave it a new job
Following on from our preview, here’s Ben Gelman and Sean Bergeron’s research on enhancing command line classification with benign anomalous data Contact us today for more information about SOPHOS cyber […]
Continue Reading
You must be logged in to post a comment.