A deep dive into over 150 incident-response cases reveals both attackers and defenders picking up the pace Contact us today for more information about SOPHOS cyber security solutions
Continue Reading-
‘AuKill’ EDR killer malware abuses Process Explorer driver
Driver-based attacks against security products are on the rise Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
3CX Desktop Attack: Sophos Customer Information
Overview Sophos X-Ops is tracking an attack against the 3CX Desktop application, possibly undertaken by a nation-state-related group. The affected software is 3CX – a legitimate software-based PBX phone system […]
Continue Reading -
GPT for you and me: Applying AI language processing to cyber defenses
Three SophosAI projects harness the model behind ChatGPT for better detection of malicious activity. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
A border-hopping PlugX USB worm takes its act on the road
Borne aloft by DLL sideloading, a far-flung infection touches ten time zones Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sour Grapes: stomping on a Cambodia-based “pig butchering” scam
A text message leads to discovery of a vast scam infrastructure run by Chinese cyber-criminals. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
A diverse set of fixes in February’s Patch Tuesday release
Patches for Power BI, PEAP, PostScript, Exchange, and 3D Builder Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Fraudulent “CryptoRom” trading apps sneak into Apple and Google app stores
Using changing remote content, apps slide by official review process to deliver fraud through the Apple App Store and Google Play Store. Contact us today for more information about SOPHOS […]
Continue Reading -
January 2023 patch roundup: Microsoft tees up 98 updates
Adobe greets the new year with patches for 18 vulns in Reader, Acrobat, and others; sun sets on the last of Win7, 8, RT support Contact us today for more […]
Continue Reading -
The scammers who scam scammers on cybercrime forums: Part 4
A shadowy sub-economy is more than just a curiosity – it’s booming business, and also an opportunity for defenders. In the fourth and final part of our series, we look […]
Continue Reading -
The scammers who scam scammers on cybercrime forums: Part 3
A shadowy sub-economy is more than just a curiosity – it’s booming business, and also an opportunity for defenders. In the third part of our series, we look at the […]
Continue Reading -
The scammers who scam scammers on cybercrime forums: Part 2
A shadowy sub-economy is more than just a curiosity – it’s booming business, and also an opportunity for defenders. In the second part of our series, we look at the […]
Continue Reading -
Signed driver malware moves up the software trust chain
The criminals signed their AV-killer malware, closely related to one known as BURNTCIGAR, with a legitimate WHCP certificate Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
The scammers who scam scammers on cybercrime forums: Part 1
A shadowy sub-economy is more than just a curiosity – it’s booming business, and also an opportunity for defenders. In the first of a four-part series, we look at the […]
Continue Reading -
Detection Tools and Human Analysis Lead to a Security Non-Event
A look at how MDR turned a targeted attack into a non-event, in which no high-value credentials are compromised and several dozen employees are not tricked into letting a bad […]
Continue Reading -
LockBit 3.0 ‘Black’ attacks and leaks reveal wormable capabilities and tooling
Reverse-engineering reveals close similarities to BlackMatter ransomware, with some improvements Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.