Are threat actors turning to archives and disk images as macro usage dwindles?

Credit to Author: Matt Wixey| Date: Wed, 12 Oct 2022 11:00:28 +0000

Following Microsoft’s announcement that macros from the internet will be disabled by default, threat actors are using alternative file types for malware delivery. This shift brings both challenges and opportunities for organizations.

Read more

Six months on: Looking back at the role of cyberattacks in the Ukraine War

Credit to Author: Chester Wisniewski| Date: Wed, 14 Sep 2022 13:00:39 +0000

When Russia invaded Ukraine on February 24th 2022, none of us knew what role cyberattacks might play in a full-scale invasion. Russia had been conducting cyberattacks against Ukraine since it had occupied Crimea back in 2014 and it seemed inevitable that these tools would play a role, especially after the attacks on Ukraine’s power grid […]

Read more

Behind the Research: The Making of “OODA: X-Ops Takes on Burgeoning SQL Server Attacks”

Credit to Author: Christopher Budd| Date: Wed, 20 Jul 2022 11:00:25 +0000

Today, we released new Sophos research into a series of Microsoft SQL Server attacks. We also released a new piece outlining our vision of how security operations can and will be enhanced and improved by machine learning and artificial intelligence: “Building the AI-Driven SOC: Sophos’ 5-Year Perspective.” Finally, today we announced the launch of Sophos […]

Read more