Sophos Acquires SOC.OS
Credit to Author: Joe Levy| Date: Fri, 22 Apr 2022 13:00:10 +0000
Expanding Sophos’ Adaptive Cybersecurity Ecosystem to Include Telemetry from Third-Party Security and IT Solutions
Read moreCredit to Author: Joe Levy| Date: Fri, 22 Apr 2022 13:00:10 +0000
Expanding Sophos’ Adaptive Cybersecurity Ecosystem to Include Telemetry from Third-Party Security and IT Solutions
Read moreCredit to Author: Paul Ducklin| Date: Wed, 16 Mar 2022 01:22:19 +0000
Don’t leave old accounts lying around where someone sketchy could reactivate them.
Read moreCredit to Author: Paul Ducklin| Date: Wed, 16 Mar 2022 01:22:19 +0000
Don’t leave old accounts lying around where someone sketchy could reactivate them.
Read moreCredit to Author: stephenlawton| Date: Wed, 09 Mar 2022 11:00:47 +0000
Prevent, detect, respond: The three-legged stool to protecting your organization effectively
Read moreCredit to Author: stephenlawton| Date: Wed, 23 Feb 2022 17:51:13 +0000
Prevention includes reducing your attack surface and preventing attacks from running
Read moreCredit to Author: Tilly Travers| Date: Tue, 15 Feb 2022 13:00:10 +0000
Squirrelwaffle is a malicious dropper or loader used to deliver other malware onto target systems. This guide shows Security Operations Centers (SOCs) and Incident Response Teams how to detect and respond to the presence of Squirrelwaffle on the network
Read moreCredit to Author: Chester Wisniewski| Date: Mon, 24 Jan 2022 17:52:07 +0000
Sophos reviews the scanning and attack detections for Log4Shell to see what’s really going on
Read moreCredit to Author: J.J. Thompson| Date: Wed, 15 Jan 2020 13:01:37 +0000
As geopolitical interest increases, discussions of threat intelligence increase which increases pressure on security operations teams to provide answers to customers and to senior leadership.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/pQqkg_WT2eU” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Mat Gangwer| Date: Wed, 15 Jan 2020 10:02:05 +0000
In addition to normal tradecraft adaptations, any time a change in the geopolitical landscape takes place, cyberattack campaigns and adversary behaviors typically shift as well. The recent events with Iran and the United States offer a relevant use case for organizations and have highlighted the benefit of having a threat intelligence driven hunting process. The […]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/SIgRbmduM5E” height=”1″ width=”1″ alt=””/>
Read more