A sea change in available data fuels fresh insights from the first half of 2024 Contact us today for more information about SOPHOS cyber security solutions
Continue Reading-
Sophos excels in the 2024 MITRE ATT&CK® Evaluations: Enterprise
Results from the latest ATT&CK Evaluations for endpoint detection and response solutions. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos named a Gartner® Peer Insights™ Customers’ Choice for Managed Detection and Response (MDR) Services for the 2nd time
Sophos is the only vendor named a Customers’ Choice across Endpoint Protection Platforms, Network Firewalls, and Managed Detection and Response Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
A milestone for Sophos NDR: 1,000 customers and counting
Organizations are increasingly choosing Sophos to defend against hidden threats on the network Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos MDR blocks and tracks activity from probable Iranian state actor “MuddyWater”
Sophos MDR has observed a new campaign that uses targeted phishing to entice the target to download a legitimate remote machine management tool to dump credentials. We believe with moderate […]
Continue Reading -
VEEAM exploit seen used again with a new ransomware: “Frag”
Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities of this threat cluster, which recently […]
Continue Reading -
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
The Internet is full of cats—and in this case, malware-delivering fake cat websites used for very targeted search engine optimization. Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats
Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Pacific Rim: What’s it to you?
Thirty-five years after the first great cat-and-mouse infosecurity story, here we are again Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Digital Detritus: The engine of Pacific Rim and a call to the industry for action
Decades of obsolete and unpatched hardware and software endanger us all Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Pacific Rim: Learning to eat soup with a knife
What our incident responders know from five years of fighting an octopus Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
From the frontlines: Our CISO’s view of Pacific Rim
On beyond “Detect and Respond” and “Secure by Design” Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Pacific Rim timeline: Information for defenders from a braid of interlocking attack campaigns
Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organizations Worldwide
Building a safer digital future for all. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Crimson Palace returns: New Tools, Tactics, and Targets
Chinese cyberespionage campaign renews efforts in multiple organizations in Southeast Asia, blending tactics and expanding efforts Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Qilin ransomware caught stealing credentials stored in Google Chrome
Familiar ransomware develops an appetite for passwords to third-party sites Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.