From the frontlines: Our CISO’s view of Pacific Rim
Credit to Author: Ross McKerchar| Date: Thu, 31 Oct 2024 12:41:21 +0000
On beyond “Detect and Respond” and “Secure by Design”
Read moreCredit to Author: Ross McKerchar| Date: Thu, 31 Oct 2024 12:41:21 +0000
On beyond “Detect and Respond” and “Secure by Design”
Read moreCredit to Author: Chester Wisniewski| Date: Thu, 31 Oct 2024 12:38:52 +0000
Thirty-five years after the first great cat-and-mouse infosecurity story, here we are again
Read moreCredit to Author: Ross McKerchar| Date: Thu, 31 Oct 2024 12:36:53 +0000
What our incident responders know from five years of fighting an octopus
Read moreCredit to Author: Joe Levy| Date: Thu, 31 Oct 2024 12:34:51 +0000
Decades of obsolete and unpatched hardware and software endanger us all
Read moreCredit to Author: Andrew Brandt| Date: Wed, 16 Oct 2024 13:01:41 +0000
Attackers leverage QR codes in PDF email attachments to spearphish corporate credentials from mobile devices
Read moreCredit to Author: Giusy Martin| Date: Tue, 17 Sep 2024 06:12:03 +0000
La campagna cinese di cyber-spionaggio rinnova gli sforzi in diverse organizzazioni del sud-est asiatico, combinando nuove tattiche ed espandendo i suoi obiettivi
Read moreCredit to Author: Jagadeesh Chandraiah| Date: Thu, 12 Sep 2024 06:32:49 +0000
Sophos X-Ops esplora le modalità di diffusione e le potenzialità dell’Atomic macOS Stealer (AMOS)
Read moreCredit to Author: gallagherseanm| Date: Tue, 10 Sep 2024 10:00:54 +0000
Chinese cyberespionage campaign renews efforts in multiple organizations in Southeast Asia, blending tactics and expanding efforts
Read moreCredit to Author: Jagadeesh Chandraiah| Date: Fri, 06 Sep 2024 11:04:28 +0000
Sophos X-Ops explores the distribution and capabilities of the Atomic macOS Stealer (AMOS)
Read moreCredit to Author: Matt Wixey| Date: Thu, 15 Aug 2024 16:37:18 +0000
Sophos X-Ops takes a look at the content updates in Intercept X, and how we validate and release them
Read more