Ransomware actor exploited RMM to access multiple organizations; Sophos EDR blocked encryption on customer’s network Contact us today for more information about SOPHOS cyber security solutions
Continue Reading-
Sophos Firewall v21.5: Streamlined management
How to make the most of the new features in Sophos Firewall v21.5. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
DragonForce targets rivals in a play for dominance
Not content with attacking retailers, this aggressive group is fighting a turf war with other ransomware operators Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist
Another adversary picks up the email bombing / vishing Storm-1811 playbook, doing thorough reconnaissance to target specific employees with fake help desk call—this time, over the phone. Contact us today […]
Continue Reading -
Sophos Partners with Capsule on New Cyber Insurance Program
The partnership rewards real-world, observable security controls, while removing the traditional barriers to insurance coverage. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos MDR: New analyst response actions for Microsoft 365
Powerful new capabilities enable Sophos MDR analysts to respond to M365 attacks on your behalf. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 5)
In the last of our five-part series, Sophos X-Ops explores the implications and opportunities arising from threat actors’ involvement in real-world industries and crimes Contact us today for more information […]
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 2)
In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 1)
Sophos X-Ops investigates what financially motivated threat actors invest their ill-gotten profits in, once the dust has settled Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 4)
In the fourth of our five-part series, Sophos X-Ops explores threat actors’ real-world criminal business interests Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 3)
In the third of our five-part series, Sophos X-Ops explores the more legally and ethically dubious business interests of financially motivated threat actors Contact us today for more information about […]
Continue Reading -
Sophos Firewall v21.5: DNS protection
How to make the most of the new features in Sophos Firewall v21.5. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Microsoft primes 71 fixes for May Patch Tuesday
Five issues actively exploited in the wild, but the real excitement may have been handled in advance Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Nineteen Sophos Women Recognized by CRN’s Women of the Channel
CRN honors Sophos women whose channel expertise and vision are deserving of recognition. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Introducing the Sophos MSP Elevate program
Accelerating MSP business growth and elevating customers’ defenses with differentiated cybersecurity products and services. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Lumma Stealer, coming and going
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.