The realities of ransomware attacks facing education providers in 2023, including the frequency, root causes of attacks, and data recovery costs. Contact us today for more information about SOPHOS cyber […]
Continue Reading-
Sophos Discovers Ransomware Abusing “Sophos” Name
Updated, July 24: This article has been updated with further information on the encryption method used by the ransomware and other details of the ransomware itself, as well as a […]
Continue Reading -
The State of Ransomware in Financial Services 2023
New insights into how ransomware impacts the financial services sector, including the frequency, root causes of attacks, and data recovery costs. Contact us today for more information about SOPHOS cyber […]
Continue Reading -
Clop At The Top – But For How Long?
Halfway through 2023, the threat landscape is dominated by one loud, adaptable, persistent player Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
The State of Ransomware in Retail 2023
New insights into how ransomware impacts the retail sector, including the frequency, root causes of attacks, and data recovery costs. Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
The State of Ransomware in Manufacturing and Production 2023
Get insights into real-world ransomware experiences – including the frequency, costs, and root causes of attacks – in our latest annual survey of the manufacturing and production sector. Contact us […]
Continue Reading -
The State of Ransomware 2023
The latest edition of Sophos’ annual ransomware study reveals the reality facing organizations in 2023, including the frequency, cost and root cause of attacks. Contact us today for more information […]
Continue Reading -
Akira Ransomware is “bringin’ 1988 back”
A new recently observed ransomware family dubbed Akira uses a retro aesthetic on their victim site very reminiscent of the 1980s green screen consoles and possibly takes its namesake from […]
Continue Reading -
Sophos Announces Partnership with Measured Analytics and Insurance
Unlocking cyber insurance premium savings for Sophos’ U.S. customers Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Cyber Insurance Adoption: The Critical Role of Frontline Cyber Defenses
Findings from a new research study into the relationship between cybersecurity, cyber insurance, and ransomware Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Everything Everywhere All At Once: The 2023 Active Adversary Report for Business Leaders
A deep dive into over 150 incident-response cases reveals both attackers and defenders picking up the pace Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Best Practices for Securing Your Firewall
While your Sophos Firewall is a security product, it also needs to be secured. Follow these best practices to optimize the security of your network. Contact us today for more information […]
Continue Reading -
Sophos Endpoint Tamper Protection Thwarts a Sophisticated Ransomware Attack
Customers were protected from a novel attack that used a malicious, signed driver to which virtually all EDR software is vulnerable. Contact us today for more information about SOPHOS cyber […]
Continue Reading -
Endpoint Best Practices to Block Ransomware
Discover the six endpoint security measures that can help mitigate the risk of a ransomware attack. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
LockBit 3.0 ‘Black’ attacks and leaks reveal wormable capabilities and tooling
Reverse-engineering reveals close similarities to BlackMatter ransomware, with some improvements Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Best Practices for Securing Your Network from Ransomware
Discover the seven network security measures that can help mitigate the risk of a ransomware attack. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.