The SVG file format can harbor malicious HTML, scripts, and malware Contact us today for more information about SOPHOS cyber security solutions
Continue Reading-
Update: Cybercriminals still not fully on board the AI train (yet)
A year after our initial research on threat actors’ attitudes to generative AI, we revisit some underground forums and find that many cybercriminals are still skeptical – although there has […]
Continue Reading -
Sophos MDR tracks two ransomware campaigns using “email bombing,” Microsoft Teams “vishing”
Sophos MDR identifies a new threat cluster riffing on the playbook of Storm-1811, and amped-up activity from the original connected to Black Basta ransomware. Contact us today for more information […]
Continue Reading -
Gootloader inside out
Open-source intelligence reveals the server-side code of this pernicious SEO-driven malware – without needing a lawyer afterward Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
159-CVE January Patch Tuesday smashes single-month record
Brace yourselves… and consider reading your email in plaintext for now Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Prioritizing patching: A deep dive into frameworks and tools – Part 2: Alternative frameworks
In the second of a two-part series on tools and frameworks designed to help with remediation prioritization, we explore some alternatives to CVSS Contact us today for more information about […]
Continue Reading -
Prioritizing patching: A deep dive into frameworks and tools – Part 1: CVSS
In the first of a two-part series exploring tools and frameworks which can help organizations with remediation prioritization, Sophos X-Ops takes a look at the Common Vulnerability Scoring System (CVSS) […]
Continue Reading -
Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces
A sudden disruption of a major phishing-as-a-service provider leads to the rise of another…that looks very familiar Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
The Bite from Inside: The Sophos Active Adversary Report
A sea change in available data fuels fresh insights from the first half of 2024 Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Keeping it real: Sophos and the 2024 MITRE ATT&CK Evaluations: Enterprise
Sophos X-Ops looks at the realism of this year’s MITRE ATT&CK Evaluations Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
December Patch Tuesday arrives bearing 71 gifts
Seventeen Critical-severity CVEs ready to deck your halls; also, new blog guidance for Windows Server admins Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos MDR blocks and tracks activity from probable Iranian state actor “MuddyWater”
Sophos MDR has observed a new campaign that uses targeted phishing to entice the target to download a legitimate remote machine management tool to dump credentials. We believe with moderate […]
Continue Reading -
November Patch Tuesday loads up everyone’s plate
Fourteen product families affected as 2024 passes an unfortunate milestone Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
VEEAM exploit seen used again with a new ransomware: “Frag”
Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities of this threat cluster, which recently […]
Continue Reading -
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
The Internet is full of cats—and in this case, malware-delivering fake cat websites used for very targeted search engine optimization. Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
From QR to compromise: The growing “quishing” threat
Attackers leverage QR codes in PDF email attachments to spearphish corporate credentials from mobile devices Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.