The remarkable decline in attacker dwell time is now well-documented, but what does that mean for those doing the hands-on work of infosecurity? Contact us today for more information about […]
Continue Reading-
Same threats, different ransomware
A threat cluster’s switch from Vice Society to Rhysida Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Memory scanning leaves attackers nowhere to hide
Sophos X-Ops takes an in-depth look at memory scanning and why it matters Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Identifying Group Policy attacks
A threat hunt looks at three attacker changes to a compromised Active Directory, and explains how to both understand and overcome them Contact us today for more information about SOPHOS […]
Continue Reading -
Investigating data exfiltration…
…and introducing Sophos X-Ops’ new video channel, which provides viewers (and readers too) with a little something extra Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Step-by-step through the Money Message ransomware
Money Message is an insidious ransomware family known for resisting detection and remediation in various ways. We walk through a recent case Contact us today for more information about SOPHOS […]
Continue Reading -
Ransomware actor exploits unsupported ColdFusion servers—but comes away empty-handed
Multiple LockBit knock-off attacks in September targeting obsolete software foiled, exposing tactics and tools. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Patch Tuesday harvests a bumper crop in October
Two significant vulnerabilities – both extending far beyond Microsoft – make this a crucial month for admins to stay on their game Contact us today for more information about SOPHOS […]
Continue Reading -
Latest evolution of ‘pig butchering’ scam lures victim into fake mining scheme
Liquidity mining scam puts cruel new spin on Chinese cryptocurrency fraud, with a dash of AI chat Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
A 59-CVE Patch Tuesday with something for nearly everyone
A wide-ranging month includes four patches you may have applied in August, as well an item of particular end-user interest Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
For the win? Offensive research contests on criminal forums
We explore some of the entries in recent cybercrime research competitions, and what they say about threat actor innovation and priorities Contact us today for more information about SOPHOS cyber […]
Continue Reading -
Time keeps on slippin’ slippin’ slippin’: The 2023 Active Adversary Report for Tech Leaders
A deep dive into incident-response cases from the first half of this year finds both attackers and defenders picking up the pace Contact us today for more information about SOPHOS […]
Continue Reading -
Attacker combines phone, email lures into believable, complex attack chain
A social engineering phone call lends authenticity to the attacker’s malicious email Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
A piñata of patches for Microsoft in August
A lighter month than July with just 73 fixes on tap, but a phalanx of advisories and third-party alerts will keep sysadmins bashing away Contact us today for more information […]
Continue Reading -
Enough attribution to count
Naming and shaming the bad guys can be gratifying, but for practical protection, Threat Activity Clusters are the way Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Clustering attacker behavior reveals hidden patterns
A series of ransomware attacks made by different groups share curiously similar characteristics Contact us today for more information about SOPHOS cyber security solutions
Continue Reading
You must be logged in to post a comment.