Qilin ransomware caught stealing credentials stored in Google Chrome
Credit to Author: Angela Gunn| Date: Thu, 22 Aug 2024 10:45:48 +0000
Familiar ransomware develops an appetite for passwords to third-party sites
Read moreCredit to Author: Angela Gunn| Date: Thu, 22 Aug 2024 10:45:48 +0000
Familiar ransomware develops an appetite for passwords to third-party sites
Read moreCredit to Author: Angela Gunn| Date: Tue, 13 Aug 2024 09:59:22 +0000
The “Mad Liberator” ransomware group leverages social-engineering moves to watch out for
Read moreCredit to Author: Angela Gunn| Date: Wed, 12 Jun 2024 18:59:54 +0000
Investigation insights and recommendations from a recent welter of incident-response cases
Read moreCredit to Author: Sally Adam| Date: Tue, 14 May 2024 07:00:35 +0000
I am delighted to announce that the Sophos Incident Response service has been awarded U.K.’s National Cyber Security Centre (NCSC) Cyber Incident Response (CIR) Level 2 status by CREST. This assurance confirms that amid the sophisticated cybersecurity threat landscape, Sophos has the experience and capabilities to deal with incidents caused by financially motivated criminals, such […]
Read moreCredit to Author: Angela Gunn| Date: Mon, 13 May 2024 08:30:24 +0000
For incident responders, a variety of techniques for information retrieval from locked-up VMs
Read moreCredit to Author: Angela Gunn| Date: Wed, 03 Apr 2024 10:01:37 +0000
The latter half of 2023 found numerous fronts on which attackers failed to press ahead. Are defenders failing to take advantage?
Read moreCredit to Author: Angela Gunn| Date: Wed, 20 Mar 2024 16:18:21 +0000
What is RDP, why is it a very nearly ubiquitous finding in incident response, and how can investigators run it to ground it when it goes wrong? An Active Adversary Special Report
Read moreCredit to Author: Angela Gunn| Date: Wed, 20 Mar 2024 16:16:34 +0000
Is it really that risky to expose an RDP port to the internet? What if you change the default port? What if it’s just for a little while? The data answers, loud and clear
Read moreCredit to Author: Angela Gunn| Date: Wed, 20 Mar 2024 16:15:12 +0000
How can defenders begin to make sense of RDP issues on their networks? We present three powerful tools for investigators’ toolkits
Read moreCredit to Author: Angela Gunn| Date: Wed, 20 Mar 2024 16:13:08 +0000
Where in the world is your attacker? Presenting a less-known but useful event to look for in your logs
Read more