This past Tuesday, Microsoft released its normal, monthly updates to Windows and other Microsoft products. Among the fixes included in this month’s release was one that resolves a security vulnerability […]
Continue Reading-
Don’t let imposters into your inbox
Phishing emails impersonating well-known brands and VIPs within an organization are a big problem for security teams to deal with. So, we’re excited to announce that you’ll now be able […]
Continue Reading -
MyKings botnet spreads headaches, cryptominers, and Forshare malware
There’s a pretty good chance everyone who reads this story will have had some degree of interaction with a botnet we call MyKings (and others call DarkCloud or Smominru), whether […]
Continue Reading -
A Lighter-than-normal Patch Tuesday for December, 2019
In this month’s security updates, Microsoft is fixing 36 vulnerabilities: 7 of them are considered critical, 27 important, and 1 moderate. One of them is not categorized but, based on […]
Continue Reading -
Three-peat: Intercept X wins Best Endpoint Security again
Famous “three-peats”:– 1962-1964 Toronto Maple Leafs– 1972-1974 Oakland A’s– 1996-1998 Chicago Bulls– 1998-2000 Yankees– 2000-2002 LA Lakers– 2007-2009 Manchester United– 2017-2019 Sophos Intercept X In November, CRN®, a brand of […]
Continue Reading -
Ransomware: the cyberthreat that just won’t die
Thirty years on from the world’s first attack, ransomware is stronger than ever. Cybercriminals continue to evolve their tactics and techniques, taking advantage of changes in technology and society to […]
Continue Reading -
Webcast: XG Firewall v18 innovations live
With the XG Firewall v18 early access program now underway, we would love it if you could join us for a special community webcast happening on Thursday, November 14. We […]
Continue Reading -
Sophos EDR gets enhanced with prioritized lists of suspicious items
‘Where do I start?’ is one of the most common questions we get asked about endpoint detection and response (EDR). The newly introduced Threat Indicators feature for Sophos EDR answers […]
Continue Reading -
Switching from Symantec to Sophos just got even easier
If you’re planning a migration from Symantec Endpoint Protection (SEP), or at least thinking about it, you’re not alone. More and more organizations are making the switch from Symantec to […]
Continue Reading -
Firewall group management just got easier
Since XG Firewall joined Sophos Central earlier this year, we’ve been steadily adding features to make day-to-day management of your firewalls even easier. And today, the team is pleased to […]
Continue Reading -
Enhanced protection comes to Intercept X
Intercept X has launched a new early access program (EAP) that brings protection enhancements including Anti-Malware Scanning Interface Protection (AMSI) and Malicious Network Traffic Protection. AMSI is a Microsoft interface […]
Continue Reading -
Beware the square: how to spot malicious QR codes
Have you ever wondered about those little digi-squares staring back at you from the corners of posters, magazine articles, cereal boxes and countless other products? They’re called QR codes – […]
Continue Reading -
XG Firewall v18 early access is now available
We are excited to open the Early Access Program (EAP) of XG Firewall v18 to all Sophos customers and partners. This release offers a ton of great new features and […]
Continue Reading -
Sophos wins multiple channel leadership awards
Channel Best is one of our Sophos values, and we’re proud to work with more than 47,000 expert partners and managed service providers across the globe. In recognition of our […]
Continue Reading -
Baldr vs The World: A SophosLabs report
(This blog post is a condensed summary of the report Baldr vs The World. – ed.) The videos touting cheat utilities for games like Apex Legends and Counter Strike: Go […]
Continue Reading -
A new Equation Editor exploit goes commercial, as maldoc attacks using it spike
There is a distinct point of maturation in the life cycle of an Office exploit: the point where it becomes generally available for the crimeware groups. Before that point the […]
Continue Reading
You must be logged in to post a comment.