Four years on, Genesis Marketplace remains the go-to underground market for easy access to other people’s data Contact us today for more information about SOPHOS cyber security solutions
Continue Reading-
Behind the Research: The Making of “OODA: X-Ops Takes on Burgeoning SQL Server Attacks”
Today, we released new Sophos research into a series of Microsoft SQL Server attacks. We also released a new piece outlining our vision of how security operations can and will […]
Continue Reading -
OODA: X-Ops Takes On Burgeoning SQL Server Attacks
How do the pieces of Sophos X-Ops fit together? A combined effort makes tidy work of a threat actor’s big play Contact us today for more information about SOPHOS cyber […]
Continue Reading -
Sophos X-Ops FAQ
What exactly is Sophos X-Ops? Sophos X-Ops is a new, cross-operational (X-Ops) team linking SophosLabs, Sophos SecOps and Sophos AI, three established teams of cybersecurity experts at Sophos, to help […]
Continue Reading -
BlackCat ransomware attacks not merely a byproduct of bad luck
Older hardware and outdated operating systems contribute to attacks Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
July Patch Tuesday is Rich in Azure, Windows Issues
Windows-facing issues make up the bulk of the 85 CVEs addressed, with one vulnerability under active exploit in the wild Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
Active Adversary Playbook 2022 Insights: Web Shells
Public proofs-of-concept of web shell exploits coincide with major spikes in attacks. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Confluence exploits used to drop ransomware on vulnerable servers
Automated attacks are now widely exploiting the Atlassian vulnerability Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos uncovers how APT groups carried out highly targeted attack
Two groups with common task targeted network security devices in two-stage attacks, dropping remote access tools. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Telerik UI exploitation leads to cryptominer, Cobalt Strike infections
Attacker targets bugs in a popular web application graphical interface development tool Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Lighter Patch Tuesday for June remains rich in LDAP vulns
The second-lightest set of updates so far in 2022 goes heavy on RCEs, brings along four Intel patches for company Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
Move fast, unbreak things: About the Sophos Active Adversary Playbook 2022
Our latest report shows that the most pleasant way to learn from Rapid Response mayhem is to read about how it worked out for someone else Contact us today for […]
Continue Reading
You must be logged in to post a comment.