A return to pre-April CVE volumes, mostly for Windows, though two vulns – or is it three? — are already under exploit Contact us today for more information about SOPHOS […]
Continue Reading-
The role of law enforcement in remediating ransomware attacks
While 97% of organizations hit by ransomware report the attack, the level of involvement of law enforcement and/or official bodies varies considerably by country. Contact us today for more information […]
Continue Reading -
Sophos Incident Response achieves NCSC Certified Incident Response (CIR) Level 2 status
I am delighted to announce that the Sophos Incident Response service has been awarded U.K.’s National Cyber Security Centre (NCSC) Cyber Incident Response (CIR) Level 2 status by CREST. This […]
Continue Reading -
Extracting data from encrypted virtual disks: six methods
For incident responders, a variety of techniques for information retrieval from locked-up VMs Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Defenders assemble: Time to get in the game
Recent research finds signs of progress in the public-private alliance against ransomware Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos named a Leader in the 2024 IDC MarketScape for Worldwide Managed Detection and Response (MDR)
The IDC MarketScape evaluates the capabilities and business strategies of managed detection and response service providers worldwide. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
The State of Ransomware 2024
Our fifth annual report reveals how ransomware experiences have changed over the last year, plus brand-new insights into the business impact of an attack. Contact us today for more information […]
Continue Reading -
Malware campaign attempts abuse of defender binaries
Command-and-control wares try to sneak onto systems disguised as various vendors; payloads vary, but Sophos customers are protected Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
‘Junk gun’ ransomware: Peashooters can still pack a punch
A Sophos X-Ops investigation finds that a wave of crude, cheap ransomware could spell trouble for small businesses and individuals – but also provide insights into threat actor career development […]
Continue Reading -
Smoke and (screen) mirrors: A strange signed backdoor
Sophos X-Ops discovers a curious backdoored (and signed) executable, masquerading as something else entirely Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos Named Best MSP Solution by SE Labs
Sophos has been recognized for enabling MSPs to effectively defend customers against today’s complex cyberattacks. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Introducing Sophos Managed Risk, Powered by Tenable
Sophos Managed Risk combines vulnerability management technology from Tenable with Sophos’ threat expertise as a fully managed service. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Unpatched Vulnerabilities: The Most Brutal Ransomware Attack Vector
While all ransomware attacks have negative outcomes, those that start by exploiting unpatched vulnerabilities have the greatest business impact. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
It’s Oh So Quiet (?): The Sophos Active Adversary Report for 1H 2024
The latter half of 2023 found numerous fronts on which attackers failed to press ahead. Are defenders failing to take advantage? Contact us today for more information about SOPHOS cyber […]
Continue Reading -
The impact of compromised backups on ransomware outcomes
Insights into the financial and operational implications of having backups compromised in a ransomware attack. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Remote Desktop Protocol: The Series
What is RDP, why is it a very nearly ubiquitous finding in incident response, and how can investigators run it to ground it when it goes wrong? An Active Adversary […]
Continue Reading
You must be logged in to post a comment.