In the last of our five-part series, Sophos X-Ops explores the implications and opportunities arising from threat actors’ involvement in real-world industries and crimes Contact us today for more information […]
Continue Reading-
Beyond the kill chain: What cybercriminals do with their money (Part 2)
In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 1)
Sophos X-Ops investigates what financially motivated threat actors invest their ill-gotten profits in, once the dust has settled Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 4)
In the fourth of our five-part series, Sophos X-Ops explores threat actors’ real-world criminal business interests Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 3)
In the third of our five-part series, Sophos X-Ops explores the more legally and ethically dubious business interests of financially motivated threat actors Contact us today for more information about […]
Continue Reading -
Microsoft primes 71 fixes for May Patch Tuesday
Five issues actively exploited in the wild, but the real excitement may have been handled in advance Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Lumma Stealer, coming and going
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Finding Minhook in a sideloading attack – and Sweden too
Multifaceted changes in TTPs illustrate what researchers see when they start digging Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Moving CVEs past one-nation control
A near-miss episode of attempted defunding spotlights a need for a better way Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
The Sophos Annual Threat Report: Cybercrime on Main Street 2025
Ransomware remains the biggest threat, but old and misconfigured network devices are making it too easy Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos Annual Threat Report appendix: Most frequently encountered malware and abused software
These are the tools of the trade Sophos detected in use by cybercriminals over 2024 Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Industrial-strength April Patch Tuesday covers 135 CVEs
One actively exploited issue patched; five Critical-severity Office vulns exploitable via Preview Pane Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
It takes two: The 2025 Sophos Active Adversary Report
The dawn of our fifth year deepens our understanding of the enemies at the gate, and some tensions inside it; plus, an anniversary gift from us to you Contact us […]
Continue Reading -
Qilin affiliates spear-phish MSP ScreenConnect admin, targeting customers downstream
Attack matches three-year long pattern of ScreenConnect attacks tracked by Sophos MDR as STAC4365. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Stealing user credentials with evilginx
A malevolent mutation of the widely used nginx web server facilitates Adversary-in-the-Middle action, but there’s hope Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
PJobRAT makes a comeback, takes another crack at chat apps
Sophos X-Ops uncovers a recent campaign from an Android RAT first seen in 2019 – now infecting users in Taiwan Contact us today for more information about SOPHOS cyber security […]
Continue Reading
You must be logged in to post a comment.