On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines: sports, the military, transport, crisis preparedness, […]
Continue Reading-
From inbox clutter to costly compromise: Why email threats still matter
When people think of cyber threats today, ransomware tends to dominate the conversation. It’s flashy, destructive, and grabs headlines. But ransomware rarely arrives on its own. More often than not, […]
Continue Reading -
Cybersecurity Awareness Month: 10 tips to Stay Safe Online that anyone can use
The threat of ransomware and data theft continues to evolve. Adversaries are increasingly exploiting unpatched network-edge devices, and credential theft and social engineering techniques can turn everyday tools into attack […]
Continue Reading -
K-12 schools face cybersecurity risks inside and outside of the classroom
Phishing was the most common access vector for ransomware infections at lower education institutions over the past year As schools continue to expand their digital footprint, the threat of phishing, […]
Continue Reading -
Scalable Vector Graphics files pose a novel phishing threat
The SVG file format can harbor malicious HTML, scripts, and malware Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces
A sudden disruption of a major phishing-as-a-service provider leads to the rise of another…that looks very familiar Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos MDR blocks and tracks activity from probable Iranian state actor “MuddyWater”
Sophos MDR has observed a new campaign that uses targeted phishing to entice the target to download a legitimate remote machine management tool to dump credentials. We believe with moderate […]
Continue Reading -
From QR to compromise: The growing “quishing” threat
Attackers leverage QR codes in PDF email attachments to spearphish corporate credentials from mobile devices Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Phishing, BEC attackers target candidates in local election, among others
An escalating series of email-borne attacks were sent to candidates, including the author Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.