Public proofs-of-concept of web shell exploits coincide with major spikes in attacks. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading-
Confluence exploits used to drop ransomware on vulnerable servers
Automated attacks are now widely exploiting the Atlassian vulnerability Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Sophos uncovers how APT groups carried out highly targeted attack
Two groups with common task targeted network security devices in two-stage attacks, dropping remote access tools. Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Telerik UI exploitation leads to cryptominer, Cobalt Strike infections
Attacker targets bugs in a popular web application graphical interface development tool Contact us today for more information about SOPHOS cyber security solutions
Continue Reading -
Lighter Patch Tuesday for June remains rich in LDAP vulns
The second-lightest set of updates so far in 2022 goes heavy on RCEs, brings along four Intel patches for company Contact us today for more information about SOPHOS cyber security […]
Continue Reading -
Move fast, unbreak things: About the Sophos Active Adversary Playbook 2022
Our latest report shows that the most pleasant way to learn from Rapid Response mayhem is to read about how it worked out for someone else Contact us today for […]
Continue Reading
You must be logged in to post a comment.