In the last few articles on the topic of our latest Sophos Firewall release, we’ve discussed the importance of Secure by Design and covered one of the highlights of this […]
Continue Reading-
5 ways to strengthen your firewall and endpoint’s defenses against ransomware
Ransomware attacks are evolving faster than ever. For already stretched IT and security teams, staying ahead can feel impossible, but it doesn’t have to be. The right combination of firewall […]
Continue Reading -
Detecting fraudulent North Korean hires: A CISO playbook
The North Korean worker scheme has expanded into a global threat. Although it originally focused on U.S. technology companies, the scheme has spread to other regions and sectors, including finance, […]
Continue Reading -
Phake phishing: Phundamental or pholly?
On paper, it sounds so simple: you prepare for the real thing by running simulations. After all, the same principle applies to countless disciplines: sports, the military, transport, crisis preparedness, […]
Continue Reading -
BRONZE BUTLER exploits Japanese asset management software vulnerability
In mid-2025, Counter Threat Unit™ (CTU) researchers observed a sophisticated BRONZE BUTLER campaign that exploited a zero-day vulnerability in Motex LANSCOPE Endpoint Manager to steal confidential information. The Chinese state-sponsored […]
Continue Reading -
Build a prevention-first defense: The Sophos Cybersecurity Toolkit
Ransomware remains one of today’s most disruptive cyber threats, but it is far from the only one. Attackers are also exploiting unpatched systems, launching AI-driven phishing campaigns, and using stolen […]
Continue Reading -
Windows Server Update Services (WSUS) vulnerability abused to harvest sensitive data
Counter Threat Unit™ (CTU) researchers are investigating exploitation of a remote code execution vulnerability (CVE-2025-59287) in Microsoft’s Windows Server Update Service (WSUS), a native IT management tool for Windows systems […]
Continue Reading -
Sophos Firewall v22: Health Check
Sophos Firewall v22 is now in early access and the participation has been outstanding. One of the highlights of this release is the new Health Check feature. This is just […]
Continue Reading -
Locking it down: A new technique to prevent LLM jailbreaks
Many organizations are increasingly deploying large language models (LLMs) such as OpenAI’s GPT series, Anthropic’s Claude, Meta’s LLaMA, and various models from DeepSeek, with minimal customization. This widespread reuse leads […]
Continue Reading -
We need secure products as much as we need security products
Recent events with F5 and SonicWall underline a continuing issue: network infrastructure is constantly under attack, and the cybersecurity industry continues to grapple with deep product security challenges. Our adversaries […]
Continue Reading -
Introducing Sophos Identity Threat Detection and Response (ITDR)
Adversaries exploit compromised identities, infrastructure weaknesses, and misconfigurations to gain unauthorized access to sensitive data and systems, putting user-based access and controls at the frontline of modern IT and cybersecurity. […]
Continue Reading -
Getting salty with LLMs: SophosAI unveils new defense against jailbreaking at CAMLIS 2025
Scientists from the SophosAI team will present their research at the upcoming Conference on Applied Machine Learning in Information Security (CAMLIS) in Arlington, Virginia. On October 23, Senior Data Scientist […]
Continue Reading -
Announcing the latest evolution of our Security Operations portfolio
Today, we’ve announced significant enhancements to our Security Operations portfolio, already trusted by 75,000 organizations worldwide via Sophos XDR and Sophos MDR offerings. This marks a major milestone in our […]
Continue Reading -
From inbox clutter to costly compromise: Why email threats still matter
When people think of cyber threats today, ransomware tends to dominate the conversation. It’s flashy, destructive, and grabs headlines. But ransomware rarely arrives on its own. More often than not, […]
Continue Reading -
Threat Intelligence Executive Report – Volume 2025, Number 5
The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in July and August, CTU™ researchers identified the following noteworthy issues […]
Continue Reading -
Sophos Firewall v22 is now available in early access
We’re pleased to announce that the early access program (EAP) is now underway for the latest Sophos Firewall release. This update brings several Secure by Design enhancements and many of […]
Continue Reading
You must be logged in to post a comment.