From QR to compromise: The growing “quishing” threat
Credit to Author: Andrew Brandt| Date: Wed, 16 Oct 2024 13:01:41 +0000
Attackers leverage QR codes in PDF email attachments to spearphish corporate credentials from mobile devices
Read moreCredit to Author: Andrew Brandt| Date: Wed, 16 Oct 2024 13:01:41 +0000
Attackers leverage QR codes in PDF email attachments to spearphish corporate credentials from mobile devices
Read moreCredit to Author: Giusy Martin| Date: Tue, 17 Sep 2024 06:12:03 +0000
La campagna cinese di cyber-spionaggio rinnova gli sforzi in diverse organizzazioni del sud-est asiatico, combinando nuove tattiche ed espandendo i suoi obiettivi
Read moreCredit to Author: Jagadeesh Chandraiah| Date: Thu, 12 Sep 2024 06:32:49 +0000
Sophos X-Ops esplora le modalità di diffusione e le potenzialità dell’Atomic macOS Stealer (AMOS)
Read moreCredit to Author: gallagherseanm| Date: Tue, 10 Sep 2024 10:00:54 +0000
Chinese cyberespionage campaign renews efforts in multiple organizations in Southeast Asia, blending tactics and expanding efforts
Read moreCredit to Author: Jagadeesh Chandraiah| Date: Fri, 06 Sep 2024 11:04:28 +0000
Sophos X-Ops explores the distribution and capabilities of the Atomic macOS Stealer (AMOS)
Read moreCredit to Author: Matt Wixey| Date: Thu, 15 Aug 2024 16:37:18 +0000
Sophos X-Ops takes a look at the content updates in Intercept X, and how we validate and release them
Read moreCredit to Author: Matt Wixey| Date: Tue, 06 Aug 2024 10:00:49 +0000
Sophos X-Ops examines the increasingly aggressive tactics ransomware gangs use to coerce their targets
Read moreCredit to Author: Matt Wixey| Date: Thu, 01 Aug 2024 09:42:02 +0000
Operating in kernel-space is necessary, but risky – here’s how we do it in Sophos Intercept X Advanced
Read more