The Counter Threat Unit™ (CTU) research team analyzes security threats to help organizations protect their systems. Based on observations in September and October, CTU™ researchers identified the following noteworthy issues […]
Continue Reading-
Sophos Workspace Protection Enables Safe GenAI Adoption
One of the powerful but easy capabilities of the Sophos Protected Browser are the data boundary controls – which does what it says on the tin. It establishes boundaries around […]
Continue Reading -
Sophos AI Agents: Accelerating MDR and Powering the Agentic SOC
Sophos MDR currently uses two production‑grade AI agents – both designed by our in‑house AI team and refined with our MDR analysts – to accelerate case handling and improve SOC […]
Continue Reading -
From Security Operations to Security Leadership: Sophos CISO Advantage
For years, cybersecurity progress has been measured by innovation. Faster detection. Better response. Smarter automation. And yet, real-world outcomes have failed to match the pace of technological advancement. This gap […]
Continue Reading -
Malicious use of virtual machine infrastructure
In late 2025, SophosLabs analysts investigated several WantToCry remote ransomware incidents. In each case, the attackers used virtual machines with autogenerated NetBIOS hostnames derived from Windows templates provisioned by ISPsystem, […]
Continue Reading -
Sophos Protected Browser Early Access and FAQ
Sophos Protected Browser is a new Sophos product that is part of the recently announced Workspace Protection suite. While Workspace Protection is scheduled to be generally available to purchase starting […]
Continue Reading -
High Five: Sophos Named a 2026 Gartner® Peer Insights™ Customers’ Choice for Endpoint Protection Platforms
Sophos has been named a 2026 Gartner® Peer Insights™ Customers’ Choice in the 2026 Gartner® Peer Insights™ Voice of the Customer Report for Endpoint Protection Platforms . This marks our […]
Continue Reading -
Eeny, meeny, miny, moe? How ransomware operators choose victims
Counter Threat Unit™ (CTU) researchers are frequently asked about ransomware groups posing a threat to organizations in specific verticals or geographic locations. These questions usually follow the publication of third-party […]
Continue Reading -
Microsoft Office vulnerability (CVE-2026-21509) in active exploitation
On January 26, 2026, Microsoft released an out-of-band update to address a high-severity (CVSS score of 7.8) vulnerability affecting multiple Microsoft Office products. This vulnerability, tracked as CVE-2026-21509, is being […]
Continue Reading -
From point-in-time audits to continuous confidence: How Sophos IT transformed identity defense
Attackers don’t break in — they log in. That shift has made identity the new perimeter of modern cybersecurity. Every enterprise wrestles with the same challenge: a constantly changing identity […]
Continue Reading -
Infostealers: The silent doorway to identity attacks — and why proactive defense matters
Credential theft isn’t just an inconvenience. It’s often the first move in a chain reaction that ends in full-scale compromise. Beyond the dreaded password reset process, information stealers, as shown […]
Continue Reading -
Case Study: University of West England uses Sophos solutions to protect thousands of students across multiple campuses
At the University of the West of England (UWE Bristol), cybersecurity plays a critical role in ensuring uninterrupted education for 38,000 students spread across multiple campuses. Facing limited visibility and […]
Continue Reading -
Sophos named a Leader in the KuppingerCole 2025 Leadership Compass for Email Security
Click to enlarge We’re excited to announce that Sophos has been named a Leader across all four evaluation categories — Overall, Product, Innovation, and Market — in the 2025 KuppingerCole […]
Continue Reading -
November Patch Tuesday does its chores
Microsoft on Tuesday announced 63 patches affecting 13 product families. Four of the addressed issues are considered by Microsoft to be of Critical severity, and nine have a CVSS base […]
Continue Reading -
Sophos Firewall v22: Your top-requested features
In the last few articles on the topic of our latest Sophos Firewall release, we’ve discussed many of the important enhancements to Secure by Design in Sophos Firewall v22. You […]
Continue Reading -
Defending the future: Our commitment to responsible AI in cybersecurity
In the rapidly evolving landscape of cyber threats, artificial intelligence is no longer a luxury: it’s a necessity. At Sophos, we recognized this reality early: we’ve been integrating sophisticated AI […]
Continue Reading
You must be logged in to post a comment.