Liquidity mining scam puts cruel new spin on Chinese cryptocurrency fraud, with a dash of AI chat Contact us today for more information about SOPHOS cyber security solutions
Continue Reading-
For the win? Offensive research contests on criminal forums
We explore some of the entries in recent cybercrime research competitions, and what they say about threat actor innovation and priorities Contact us today for more information about SOPHOS cyber […]
Continue Reading -
Ransomware actors log on when you log off. Here’s how to stop them.
With 90% of ransomware attacks occurring outside standard business hours, Sophos’ 24/7 Managed Detection and Response (MDR) service is now an essential part of an effective security stack. Contact us […]
Continue Reading -
Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders
A deep dive into incident-response cases from the first half of this year finds both attackers and defenders picking up the pace Contact us today for more information about SOPHOS […]
Continue Reading -
Attacker combines phone, email lures into believable, complex attack chain
A social engineering phone call lends authenticity to the attacker’s malicious email Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Enough attribution to count
Naming and shaming the bad guys can be gratifying, but for practical protection, Threat Activity Clusters are the way Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Clustering attacker behavior reveals hidden patterns
A series of ransomware attacks made by different groups share curiously similar characteristics Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sha zhu pan scam uses AI chat tool to target iPhone and Android users
“CryptoRom” fake crypto-trading mobile apps pushed through AI-assisted romance scam, using ChatGPT to lure targets. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Uncovering an Iranian mobile malware campaign
Sophos X-Ops researchers discover a cluster of credential-harvesting apps targeting Iranian bank customers Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Into the tank with Nitrogen
The element originally known as “foul air” stinks up computers as a new initial-access campaign exhibiting some uncommon techniques Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Bad ad fad leads to IcedID, Gozi infections
Malvertising campaigns using paid ads result in infostealer and backdoor attacks Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Microsoft Revokes Malicious Drivers in Patch Tuesday Culling
In December 2022, Microsoft published their monthly Windows Update packages that included an advisory about malicious drivers, signed by Microsoft and other code-signing authorities, that Sophos X-Ops (and others) observed […]
Continue Reading -
And I Shall Call It Mini-Me GPT: Using Large Language Models to Classify the Uncharted Web
Sophos AI team employs GPT and other large language models as teachers to train smaller models to label websites. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
The Phantom Menace: Brute Ratel remains rare and targeted
The commercial attack tool’s use by bad actors has faded after an initial flurry, while Cobalt Strike remains the go-to post-exploitation tool for many. Contact us today for more information […]
Continue Reading -
“FleeceGPT” mobile apps target AI-curious to rake in cash
Interest in OpenAI’s latest version of its interactive language model has spurred a new wave of scam apps looking to cash in on the hype Contact us today for more […]
Continue Reading -
A doubled “Dragon Breath” adds new air to DLL sideloading attacks
Exploits of the venerable vulnerability gain in complexity Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.