Uber, Rockstar fall to social-engineering attacks; and you?

Credit to Author: Chester Wisniewski| Date: Thu, 22 Sep 2022 18:31:26 +0000

Security pros often talk of security being a process and a system, not a destination, and the recent news from Uber and Rockstar Games is just another example. Details are still emerging, but we can still analyze these breaches at a high level and apply these lessons to our own information security programs. Similar to […]

Read more

Six months on: Looking back at the role of cyberattacks in the Ukraine War

Credit to Author: Chester Wisniewski| Date: Wed, 14 Sep 2022 13:00:39 +0000

When Russia invaded Ukraine on February 24th 2022, none of us knew what role cyberattacks might play in a full-scale invasion. Russia had been conducting cyberattacks against Ukraine since it had occupied Crimea back in 2014 and it seemed inevitable that these tools would play a role, especially after the attacks on Ukraine’s power grid […]

Read more

Behind the Research: The Making of “OODA: X-Ops Takes on Burgeoning SQL Server Attacks”

Credit to Author: Christopher Budd| Date: Wed, 20 Jul 2022 11:00:25 +0000

Today, we released new Sophos research into a series of Microsoft SQL Server attacks. We also released a new piece outlining our vision of how security operations can and will be enhanced and improved by machine learning and artificial intelligence: “Building the AI-Driven SOC: Sophos’ 5-Year Perspective.” Finally, today we announced the launch of Sophos […]

Read more

The Active Adversary Playbook 2022

Credit to Author: Tilly Travers| Date: Tue, 07 Jun 2022 11:02:43 +0000

Cyberattacker behaviors, tactics and tools seen on the frontline of incident response during 2021

Read more