Redirecting risk reduction spend from cyber insurance to MDR services is a win-win, resulting in better protection and lower cost coverage. Contact us today for more information about SOPHOS cyber […]
Continue Reading-
Cysurance announces discounted cyber insurance program for Sophos customers in Australia
Expanding our successful partnership from the United States to Australia. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
MITRE Engenuity ATT&CK Evaluations for Managed Services (menuPass + ALPHV BlackCat)
Our view on the latest round of the MITRE Engenuity ATT&CK Evaluations for Managed Services. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
RD Web Access abuse: Fighting back
Investigation insights and recommendations from a recent welter of incident-response cases Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Operation Crimson Palace: A Technical Deep Dive
Sophos Managed Detection and Response initiated a threat hunt across all customers after the detection of abuse of a vulnerable legitimate VMware executable (vmnat.exe) to perform dynamic link library (DLL) […]
Continue Reading -
Extracting data from encrypted virtual disks: six methods
For incident responders, a variety of techniques for information retrieval from locked-up VMs Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos named a Leader in the 2024 IDC MarketScape for Worldwide Managed Detection and Response (MDR)
The IDC MarketScape evaluates the capabilities and business strategies of managed detection and response service providers worldwide. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
The State of Ransomware 2024
Our fifth annual report reveals how ransomware experiences have changed over the last year, plus brand-new insights into the business impact of an attack. Contact us today for more information […]
Continue Reading -
Malware campaign attempts abuse of defender binaries
Command-and-control wares try to sneak onto systems disguised as various vendors; payloads vary, but Sophos customers are protected Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Introducing Sophos Managed Risk, Powered by Tenable
Sophos Managed Risk combines vulnerability management technology from Tenable with Sophos’ threat expertise as a fully managed service. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Remote Desktop Protocol: The Series
What is RDP, why is it a very nearly ubiquitous finding in incident response, and how can investigators run it to ground it when it goes wrong? An Active Adversary […]
Continue Reading -
Remote Desktop Protocol: Exposed RDP (is dangerous)
Is it really that risky to expose an RDP port to the internet? What if you change the default port? What if it’s just for a little while? The data […]
Continue Reading -
Remote Desktop Protocol: How to Use Time Zone Bias
Where in the world is your attacker? Presenting a less-known but useful event to look for in your logs Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Remote Desktop Protocol: Queries for Investigation
How can defenders begin to make sense of RDP issues on their networks? We present three powerful tools for investigators’ toolkits Contact us today for more information about SOPHOS cyber […]
Continue Reading -
Remote Desktop Protocol: Executing the 4624_4625 Login Query
Keeping an eye on who’s trying to get onto your network – whether or not they’re successful – can pay off on multiple fronts Contact us today for more information […]
Continue Reading -
Remote Desktop Protocol: Executing the External RDP Query
On the hunt for successful RDP connections that have entered your network from outside? A step-by-step guide (and a query to get you started) Contact us today for more information […]
Continue Reading
You must be logged in to post a comment.