On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines: sports, the military, transport, crisis preparedness, […]
Continue Reading-
Locking it down: A new technique to prevent LLM jailbreaks
Many organizations are increasingly deploying large language models (LLMs) such as OpenAI’s GPT series, Anthropic’s Claude, Meta’s LLaMA, and various models from DeepSeek, with minimal customization. This widespread reuse leads […]
Continue Reading -
Introducing Sophos Identity Threat Detection and Response (ITDR)
Adversaries exploit compromised identities, infrastructure weaknesses, and misconfigurations to gain unauthorized access to sensitive data and systems, putting user-based access and controls at the frontline of modern IT and cybersecurity. […]
Continue Reading -
Getting salty with LLMs: SophosAI unveils new defense against jailbreaking at CAMLIS 2025
Scientists from the SophosAI team will present their research at the upcoming Conference on Applied Machine Learning in Information Security (CAMLIS) in Arlington, Virginia. On October 23, Senior Data Scientist […]
Continue Reading -
Announcing the latest evolution of our Security Operations portfolio
Today, we’ve announced significant enhancements to our Security Operations portfolio, already trusted by 75,000 organizations worldwide via Sophos XDR and Sophos MDR offerings. This marks a major milestone in our […]
Continue Reading -
What happens when a cybersecurity company gets phished?
If you work in cybersecurity, you’ve probably heard the time-honored adage about cyber attacks: “It’s not a matter of if, but when.” Perhaps a better way to think of it […]
Continue Reading -
Sophos AI at Black Hat USA ’25: Anomaly detection betrayed us, so we gave it a new job
Following on from our preview, here’s Ben Gelman and Sean Bergeron’s research on enhancing command line classification with benign anomalous data Contact us today for more information about SOPHOS cyber […]
Continue Reading -
Shared secret: EDR killer in the kill chain
A look under the hood at a tool designed to disable protections Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
GOLD BLADE Remote DLL Sideloading Attack Deploys RedLoader
Attacks surged in July 2025 after the threat group updated its process to combine malicious LNK files and a recycled WebDAV technique Contact us today for more information about SOPHOS […]
Continue Reading -
Sophos’ Secure by Design 2025 Progress
One year on, we are pleased to share progress on our secure-by-design commitments. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Small world: The revitalization of small AI models for cybersecurity
Sophos X-Ops explores why larger isn’t always better when it comes to solving security challenges with AI Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
SharePoint ‘ToolShell’ vulnerabilities being exploited in the wild
Sophos X-Ops sees exploitation across multiple customer estates Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
SophosAI at Black Hat USA ’25: Anomaly detection betrayed us, so we gave it a new job
Sophos’ Ben Gelman and Sean Bergeron will present their research on enhancing command line classification with benign anomalous data at Las Vegas Contact us today for more information about SOPHOS […]
Continue Reading -
The strange tale of ischhfd83: When cybercriminals eat their own
A simple customer query leads to a rabbit hole of backdoored malware and game cheats Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 2)
In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 1)
Sophos X-Ops investigates what financially motivated threat actors invest their ill-gotten profits in, once the dust has settled Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.