A deep dive into incident-response cases from the first half of this year finds both attackers and defenders picking up the pace Contact us today for more information about SOPHOS […]
Continue Reading-
Attacker combines phone, email lures into believable, complex attack chain
A social engineering phone call lends authenticity to the attacker’s malicious email Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
A piñata of patches for Microsoft in August
A lighter month than July with just 73 fixes on tap, but a phalanx of advisories and third-party alerts will keep sysadmins bashing away Contact us today for more information […]
Continue Reading -
Enough attribution to count
Naming and shaming the bad guys can be gratifying, but for practical protection, Threat Activity Clusters are the way Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Clustering attacker behavior reveals hidden patterns
A series of ransomware attacks made by different groups share curiously similar characteristics Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sha zhu pan scam uses AI chat tool to target iPhone and Android users
“CryptoRom” fake crypto-trading mobile apps pushed through AI-assisted romance scam, using ChatGPT to lure targets. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Uncovering an Iranian mobile malware campaign
Sophos X-Ops researchers discover a cluster of credential-harvesting apps targeting Iranian bank customers Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Into the tank with Nitrogen
The element originally known as “foul air” stinks up computers as a new initial-access campaign exhibiting some uncommon techniques Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Bad ad fad leads to IcedID, Gozi infections
Malvertising campaigns using paid ads result in infostealer and backdoor attacks Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos Discovers Ransomware Abusing “Sophos” Name
Updated, July 24: This article has been updated with further information on the encryption method used by the ransomware and other details of the ransomware itself, as well as a […]
Continue Reading -
Microsoft Revokes Malicious Drivers in Patch Tuesday Culling
In December 2022, Microsoft published their monthly Windows Update packages that included an advisory about malicious drivers, signed by Microsoft and other code-signing authorities, that Sophos X-Ops (and others) observed […]
Continue Reading -
July’s Patch Tuesday: A rich harvest
Over a hundred Windows patches, a high-impact advisory, and a guest appearance by… Internet Explorer?! Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Clop At The Top – But For How Long?
Halfway through 2023, the threat landscape is dominated by one loud, adaptable, persistent player Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Introducing Cyberseriousness: A manifesto for quality, respect, integrity, and usefulness in infosec
Opening up a years-long in-house conversation about “CQ” to the wider cybersecurity world Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Investigator, API Yourself: Deploying Microsoft Graph on the trail of an attacker
Two clients, two threat hunts – any connection? Using Microsoft’s cloud-security API to parse piles of disparate data leads to fascinating findings Contact us today for more information about SOPHOS […]
Continue Reading -
A smorgasbord for June’s Patch Tuesday
Between its own fixes and a slew of FYI alerts covering Edge, GitHub, and Autodesk, Microsoft piles 94 CVEs onto sysadmins’ plates; Fortinet and Adobe also at the table Contact […]
Continue Reading
You must be logged in to post a comment.