The North Korean worker scheme has expanded into a global threat. Although it originally focused on U.S. technology companies, the scheme has spread to other regions and sectors, including finance, […]
Continue Reading-
Phake phishing: Phundamental or pholly?
On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines: sports, the military, transport, crisis preparedness, […]
Continue Reading -
Announcing the latest evolution of our Security Operations portfolio
Today, we’ve announced significant enhancements to our Security Operations portfolio, already trusted by 75,000 organizations worldwide via Sophos XDR and Sophos MDR offerings. This marks a major milestone in our […]
Continue Reading -
What happens when a cybersecurity company gets phished?
If you work in cybersecurity, you’ve probably heard the time-honored adage about cyber attacks: “It’s not a matter of if, but when.” Perhaps a better way to think of it […]
Continue Reading -
Taegis MDR/XDR now work with Sophos Firewall’s Active Threat Response
Response times go from hours or days to seconds. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Rubrik & Sophos Enhance Cyber Resilience for Microsoft 365
Cybersecurity attacks are rising sharply in 2025, and Microsoft has been one among many prominent targets. Research shows that 70 percent of M365 tenants have experienced account takeovers1 and 81 […]
Continue Reading -
Sophos named a Leader in the 2025 Frost Radar™ for Managed Detection and Response
Being named a Leader in the Frost Radar™ validates the strength of our strategy, the depth of our capabilities, and the value we deliver to customers… but we won’t stop […]
Continue Reading -
Sophos’ Secure by Design 2025 Progress
One year on, we are pleased to share progress on our secure-by-design commitments. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Strengthening cyber resilience: Introducing Internal Attack Surface Management (IASM) for Sophos Managed Risk
Enhanced vulnerability management delivered as a managed service. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers
Ransomware actor exploited RMM to access multiple organizations; Sophos EDR blocked encryption on customer’s network Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist
Another adversary picks up the email bombing / vishing Storm-1811 playbook, doing thorough reconnaissance to target specific employees with fake help desk call—this time, over the phone. Contact us today […]
Continue Reading -
Sophos MDR: New analyst response actions for Microsoft 365
Powerful new capabilities enable Sophos MDR analysts to respond to M365 attacks on your behalf. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Lumma Stealer, coming and going
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Moving CVEs past one-nation control
A near-miss episode of attempted defunding spotlights a need for a better way Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
The Sophos Annual Threat Report: Cybercrime on Main Street 2025
Ransomware remains the biggest threat, but old and misconfigured network devices are making it too easy Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos Annual Threat Report appendix: Most frequently encountered malware and abused software
These are the tools of the trade Sophos detected in use by cybercriminals over 2024 Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.