Sophos X-Ops explores the symbiotic – but often uneasy – relationship between ransomware gangs and the media, and how threat actors are increasingly seeking to wrest control of the narrative […]
Continue Reading-
Cybercriminals can’t agree on GPTs
Despite concern over illicit applications of ChatGPT and similar models, Sophos X-Ops’ exploration of cybercrime forums suggests many threat actors are still skeptical – and wrestling with the same issues […]
Continue Reading -
Memory scanning leaves attackers nowhere to hide
Sophos X-Ops takes an in-depth look at memory scanning and why it matters Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Ransomware actor exploits unsupported ColdFusion servers—but comes away empty-handed
Multiple LockBit knock-off attacks in September targeting obsolete software foiled, exposing tactics and tools. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Latest evolution of ‘pig butchering’ scam lures victim into fake mining scheme
Liquidity mining scam puts cruel new spin on Chinese cryptocurrency fraud, with a dash of AI chat Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
For the win? Offensive research contests on criminal forums
We explore some of the entries in recent cybercrime research competitions, and what they say about threat actor innovation and priorities Contact us today for more information about SOPHOS cyber […]
Continue Reading -
Ransomware actors log on when you log off. Here’s how to stop them.
With 90% of ransomware attacks occurring outside standard business hours, Sophos’ 24/7 Managed Detection and Response (MDR) service is now an essential part of an effective security stack. Contact us […]
Continue Reading -
Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders
A deep dive into incident-response cases from the first half of this year finds both attackers and defenders picking up the pace Contact us today for more information about SOPHOS […]
Continue Reading -
Attacker combines phone, email lures into believable, complex attack chain
A social engineering phone call lends authenticity to the attacker’s malicious email Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Enough attribution to count
Naming and shaming the bad guys can be gratifying, but for practical protection, Threat Activity Clusters are the way Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Clustering attacker behavior reveals hidden patterns
A series of ransomware attacks made by different groups share curiously similar characteristics Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sha zhu pan scam uses AI chat tool to target iPhone and Android users
“CryptoRom” fake crypto-trading mobile apps pushed through AI-assisted romance scam, using ChatGPT to lure targets. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Uncovering an Iranian mobile malware campaign
Sophos X-Ops researchers discover a cluster of credential-harvesting apps targeting Iranian bank customers Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Into the tank with Nitrogen
The element originally known as “foul air” stinks up computers as a new initial-access campaign exhibiting some uncommon techniques Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Bad ad fad leads to IcedID, Gozi infections
Malvertising campaigns using paid ads result in infostealer and backdoor attacks Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Microsoft Revokes Malicious Drivers in Patch Tuesday Culling
In December 2022, Microsoft published their monthly Windows Update packages that included an advisory about malicious drivers, signed by Microsoft and other code-signing authorities, that Sophos X-Ops (and others) observed […]
Continue Reading
You must be logged in to post a comment.