A simple customer query leads to a rabbit hole of backdoored malware and game cheats Contact us today for more information about SOPHOS cyber security solutions
Continue Reading-
DragonForce actors target SimpleHelp vulnerabilities to attack MSP, customers
Ransomware actor exploited RMM to access multiple organizations; Sophos EDR blocked encryption on customer’s network Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
DragonForce targets rivals in a play for dominance
Not content with attacking retailers, this aggressive group is fighting a turf war with other ransomware operators Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
A familiar playbook with a twist: 3AM ransomware actors dropped virtual machine with vishing and Quick Assist
Another adversary picks up the email bombing / vishing Storm-1811 playbook, doing thorough reconnaissance to target specific employees with fake help desk call—this time, over the phone. Contact us today […]
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 5)
In the last of our five-part series, Sophos X-Ops explores the implications and opportunities arising from threat actors’ involvement in real-world industries and crimes Contact us today for more information […]
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 2)
In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 1)
Sophos X-Ops investigates what financially motivated threat actors invest their ill-gotten profits in, once the dust has settled Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 4)
In the fourth of our five-part series, Sophos X-Ops explores threat actors’ real-world criminal business interests Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Beyond the kill chain: What cybercriminals do with their money (Part 3)
In the third of our five-part series, Sophos X-Ops explores the more legally and ethically dubious business interests of financially motivated threat actors Contact us today for more information about […]
Continue Reading -
Microsoft primes 71 fixes for May Patch Tuesday
Five issues actively exploited in the wild, but the real excitement may have been handled in advance Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Lumma Stealer, coming and going
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Finding Minhook in a sideloading attack – and Sweden too
Multifaceted changes in TTPs illustrate what researchers see when they start digging Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Moving CVEs past one-nation control
A near-miss episode of attempted defunding spotlights a need for a better way Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
The Sophos Annual Threat Report: Cybercrime on Main Street 2025
Ransomware remains the biggest threat, but old and misconfigured network devices are making it too easy Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos Annual Threat Report appendix: Most frequently encountered malware and abused software
These are the tools of the trade Sophos detected in use by cybercriminals over 2024 Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Industrial-strength April Patch Tuesday covers 135 CVEs
One actively exploited issue patched; five Critical-severity Office vulns exploitable via Preview Pane Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.