Cybersecurity Guide: Securing Government Agencies
Credit to Author: Doug Aamoth| Date: Thu, 04 May 2023 14:34:59 +0000
Sophos optimizes defense capabilities and frees up government IT teams to focus on their businesses.
Read moreCredit to Author: Doug Aamoth| Date: Thu, 04 May 2023 14:34:59 +0000
Sophos optimizes defense capabilities and frees up government IT teams to focus on their businesses.
Read moreCredit to Author: Sally Adam| Date: Wed, 03 May 2023 12:31:16 +0000
Unlocking cyber insurance premium savings for Sophos’ U.S. customers
Read moreCredit to Author: Angela Gunn| Date: Thu, 27 Apr 2023 18:43:38 +0000
A recent remote code execution (RCE) vulnerability is increasingly in use to deliver Cobalt Strike and other remote management software, along with multiple ransomware threats – what you need to know about CVE-2023-27350
Read moreCredit to Author: Angela Gunn| Date: Thu, 27 Apr 2023 18:43:38 +0000
A recent remote code execution (RCE) vulnerability is increasingly in use to deliver Cobalt Strike and other remote management software, along with multiple ransomware threats – what you need to know about CVE-2023-27350
Read moreCredit to Author: Karl Ackerman| Date: Thu, 20 Apr 2023 13:32:24 +0000
Sophos NDR updates detected two new QakBot servers that had not yet been publicly identified.
Read moreCredit to Author: Sally Adam| Date: Wed, 05 Apr 2023 13:00:03 +0000
Sophos is the only vendor rated a Leader across all five cybersecurity categories in G2’s Spring 2023 reports (March 2023)
Read moreCredit to Author: Doug Aamoth| Date: Mon, 03 Apr 2023 11:00:17 +0000
Around the clock and around the globe, Sophos keeps retail organizations secure from a wide range of cyberattacks.
Read moreCredit to Author: Editor| Date: Thu, 30 Mar 2023 08:44:21 +0000
Overview Sophos X-Ops is tracking an attack against the 3CX Desktop application, possibly undertaken by a nation-state-related group. The affected software is 3CX – a legitimate software-based PBX phone system available on Windows, Linux, Android, and iOS. The application has been abused by the threat actor to add an installer that communicates with various command-and-control […]
Read more