Sophos excels in the 2024 MITRE ATT&CK® Evaluations: Enterprise
Credit to Author: rajansanhotra| Date: Wed, 11 Dec 2024 15:55:55 +0000
Results from the latest ATT&CK Evaluations for endpoint detection and response solutions.
Read MoreRSS Reader for Computer Security Articles
Credit to Author: rajansanhotra| Date: Wed, 11 Dec 2024 15:55:55 +0000
Results from the latest ATT&CK Evaluations for endpoint detection and response solutions.
Read MoreCredit to Author: rajansanhotra| Date: Tue, 03 Dec 2024 15:53:39 +0000
Sophos is the only vendor named a Customers’ Choice across Endpoint Protection Platforms, Network Firewalls, and Managed Detection and Response
Read MoreCredit to Author: Karl Ackerman| Date: Tue, 26 Nov 2024 19:16:39 +0000
Organizations are increasingly choosing Sophos to defend against hidden threats on the network
Read MoreCredit to Author: gallagherseanm| Date: Wed, 20 Nov 2024 17:12:12 +0000
Sophos MDR has observed a new campaign that uses targeted phishing to entice the target to download a legitimate remote machine management tool to dump credentials. We believe with moderate confidence that this activity, which we track as STAC 1171, is related to an Iranian threat actor commonly referred to as MuddyWater or TA450. Earlier […]
Read MoreCredit to Author: gallagherseanm| Date: Fri, 08 Nov 2024 17:10:12 +0000
Last month, Sophos X-Ops reported several MDR cases where threat actors exploited a vulnerability in Veeam backup servers. We continue to track the activities of this threat cluster, which recently included deployment of a new ransomware. The vulnerability, CVE-2024-40711, was used as part of a threat activity cluster we named STAC 5881. Attacks leveraged compromised […]
Read MoreCredit to Author: gallagherseanm| Date: Wed, 06 Nov 2024 11:30:41 +0000
The Internet is full of cats—and in this case, malware-delivering fake cat websites used for very targeted search engine optimization.
Read MoreCredit to Author: Ross McKerchar| Date: Thu, 31 Oct 2024 12:56:23 +0000
Sophos X-Ops unveils five-year investigation tracking China-based groups targeting perimeter devices
Read MoreCredit to Author: Ross McKerchar| Date: Thu, 31 Oct 2024 12:41:21 +0000
On beyond “Detect and Respond” and “Secure by Design”
Read More