In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors Contact us today for more information about SOPHOS cyber security solutions
Continue Reading-
Beyond the kill chain: What cybercriminals do with their money (Part 1)
Sophos X-Ops investigates what financially motivated threat actors invest their ill-gotten profits in, once the dust has settled Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 4)
In the fourth of our five-part series, Sophos X-Ops explores threat actors’ real-world criminal business interests Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 3)
In the third of our five-part series, Sophos X-Ops explores the more legally and ethically dubious business interests of financially motivated threat actors Contact us today for more information about […]
Continue Reading -
PJobRAT makes a comeback, takes another crack at chat apps
Sophos X-Ops uncovers a recent campaign from an Android RAT first seen in 2019 – now infecting users in Taiwan Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
The sixth sense for cyber defense: Multimodal AI
Sophos X-Ops’ research, presented at Virus Bulletin 2024, uses ‘multimodal’ AI to classify spam, phishing, and unsafe web content Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Update: Cybercriminals still not fully on board the AI train (yet)
A year after our initial research on threat actors’ attitudes to generative AI, we revisit some underground forums and find that many cybercriminals are still skeptical – although there has […]
Continue Reading -
Prioritizing patching: A deep dive into frameworks and tools – Part 2: Alternative frameworks
In the second of a two-part series on tools and frameworks designed to help with remediation prioritization, we explore some alternatives to CVSS Contact us today for more information about […]
Continue Reading -
Prioritizing patching: A deep dive into frameworks and tools – Part 1: CVSS
In the first of a two-part series exploring tools and frameworks which can help organizations with remediation prioritization, Sophos X-Ops takes a look at the Common Vulnerability Scoring System (CVSS) […]
Continue Reading -
Year in Review 2024: The major headlines and moments from Sophos this year
From cyber attacks across the geopolitical landscapes, to product updates that help small businesses, Sophos was there in 2024. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Keeping it real: Sophos and the 2024 MITRE ATT&CK Evaluations: Enterprise
Sophos X-Ops looks at the realism of this year’s MITRE ATT&CK Evaluations Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Pacific Rim: What’s it to you?
Thirty-five years after the first great cat-and-mouse infosecurity story, here we are again Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Digital Detritus: The engine of Pacific Rim and a call to the industry for action
Decades of obsolete and unpatched hardware and software endanger us all Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Pacific Rim: Learning to eat soup with a knife
What our incident responders know from five years of fighting an octopus Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
From the frontlines: Our CISO’s view of Pacific Rim
On beyond “Detect and Respond” and “Secure by Design” Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
From QR to compromise: The growing “quishing” threat
Attackers leverage QR codes in PDF email attachments to spearphish corporate credentials from mobile devices Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.