The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in July and August, CTU™ researchers identified the following noteworthy issues […]
Continue Reading-
The State of Ransomware in Healthcare 2025
Sophos’ latest annual study explores the real-world ransomware experiences of 292 healthcare providers hit by ransomware in the past year. The report examines how the causes and consequences of these […]
Continue Reading -
K-12 schools face cybersecurity risks inside and outside of the classroom
Phishing was the most common access vector for ransomware infections at lower education institutions over the past year As schools continue to expand their digital footprint, the threat of phishing, […]
Continue Reading -
GOLD SALEM’s Warlock operation joins busy ransomware landscape
Counter Threat Unit™ (CTU) researchers are monitoring a threat group that refers to itself as Warlock Group. The group, which CTU™ researchers track as GOLD SALEM, has compromised networks and […]
Continue Reading -
The State of Ransomware in Education 2025
As many students across parts of the world return to class, ransomware remains a pressing threat to the education sector. Sophos’ latest annual study, based on the real-world experiences of […]
Continue Reading -
The State of Ransomware in Retail 2025
361 IT and cybersecurity leaders reveal the ransomware realities for retail businesses today. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
DragonForce targets rivals in a play for dominance
Not content with attacking retailers, this aggressive group is fighting a turf war with other ransomware operators Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 5)
In the last of our five-part series, Sophos X-Ops explores the implications and opportunities arising from threat actors’ involvement in real-world industries and crimes Contact us today for more information […]
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 2)
In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 1)
Sophos X-Ops investigates what financially motivated threat actors invest their ill-gotten profits in, once the dust has settled Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 4)
In the fourth of our five-part series, Sophos X-Ops explores threat actors’ real-world criminal business interests Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 3)
In the third of our five-part series, Sophos X-Ops explores the more legally and ethically dubious business interests of financially motivated threat actors Contact us today for more information about […]
Continue Reading -
Keeping it real: Sophos and the 2024 MITRE ATT&CK Evaluations: Enterprise
Sophos X-Ops looks at the realism of this year’s MITRE ATT&CK Evaluations Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Cybersecurity Awareness Month: A timely reminder to review your security posture
Explore four pressing cybersecurity challenges organizations face in 2024 and how to overcome them Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Attack tool update impairs Windows computers
An EDR killer Sophos X-Ops has tracked for three years continues to bedevil organizations targeted by ransomware gangs. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Qilin ransomware caught stealing credentials stored in Google Chrome
Familiar ransomware develops an appetite for passwords to third-party sites Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.