Maturing marketplaces, capabilities-for-hire continue to proliferate professional tools, techniques and practices across the threat spectrum. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading-
Microsoft patches 62 vulnerabilities, including Kerberos, and Mark of the Web, and Exchange…sort of
Still no fix for ProxyNotShell, but two MOTW bypasses get squashed Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Family Tree: DLL-Sideloading Cases May Be Related
A threat actor’s repeated use of DLL-hijack execution flow makes for interesting attack results, including omnivorous file ingestion; we break down five cases and find commonalities Contact us today for […]
Continue Reading -
For Cybersecurity Awareness Month, how about better cybersecurity advice?
Let us be frank: The same old warnings to users aren’t cutting it, and it’s the technologists’ fault. Chester Wisniewski lays out a wiser way. Contact us today for more […]
Continue Reading -
Are threat actors turning to archives and disk images as macro usage dwindles?
Following Microsoft’s announcement that macros from the internet will be disabled by default, threat actors are using alternative file types for malware delivery. This shift brings both challenges and opportunities […]
Continue Reading -
Remove All The Callbacks – BlackByte Ransomware Disables EDR Via RTCore64.sys Abuse
A fresh exploration of the malware uncovers a new tactic for bypassing security products by abusing a known driver vulnerability Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
Six months on: Looking back at the role of cyberattacks in the Ukraine War
When Russia invaded Ukraine on February 24th 2022, none of us knew what role cyberattacks might play in a full-scale invasion. Russia had been conducting cyberattacks against Ukraine since it […]
Continue Reading -
A lighter Patch Tuesday, but one heavy with remote code execution bugs
There are fewer bugs in September’s update than in previous months, with RCE vulns making up the bulk of the addressed CVEs Contact us today for more information about SOPHOS […]
Continue Reading -
Cookie stealing: the new perimeter bypass
As organizations move to cloud services and multifactor authentication, cookies tied to identity and authentication give attackers a new path to compromise. Contact us today for more information about SOPHOS […]
Continue Reading -
Lockbit, Hive, and BlackCat attack automotive supplier in triple ransomware attack
After gaining access via RDP, all three threat actors encrypted files, in an investigation complicated by event log clearing and backups. 3 attackers, 2 weeks – 1 entry point. Contact […]
Continue Reading -
Multiple attackers increase pressure on victims, complicate incident response
Sophos’ latest Active Adversary report explores the issue of organizations being hit multiple times by attackers Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
SophosAI presentations at Black Hat, BSides LV and DEF CON AI Village
Six presentations in Las Vegas this week cover multiple cybersecurity applications of machine learning Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Genesis Brings Polish to Stolen-Credential Marketplaces
Four years on, Genesis Marketplace remains the go-to underground market for easy access to other people’s data Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Behind the Research: The Making of “OODA: X-Ops Takes on Burgeoning SQL Server Attacks”
Today, we released new Sophos research into a series of Microsoft SQL Server attacks. We also released a new piece outlining our vision of how security operations can and will […]
Continue Reading -
OODA: X-Ops Takes On Burgeoning SQL Server Attacks
How do the pieces of Sophos X-Ops fit together? A combined effort makes tidy work of a threat actor’s big play Contact us today for more information about SOPHOS cyber […]
Continue Reading -
Building the AI-Assisted SOC: Sophos’ Five-Year Perspective
Looking ahead to the Security Operation Center of the future, forged from developments in XDR, AI innovation, and programmable security posture and powered by the AI-UX value circuit Contact us […]
Continue Reading
You must be logged in to post a comment.