Context-sensitive defenses in Sophos Endpoint
Credit to Author: Tom Walsh| Date: Tue, 26 Sep 2023 14:03:57 +0000
Sophos continues to deliver innovative new protection to guard customers from attack.
Read moreCredit to Author: Tom Walsh| Date: Tue, 26 Sep 2023 14:03:57 +0000
Sophos continues to deliver innovative new protection to guard customers from attack.
Read moreCredit to Author: Paul Ducklin| Date: Thu, 22 Dec 2022 17:56:22 +0000
Join world-renowned expert Fraser Howard, Director of Research at SophosLabs, for this fascinating episode on how to fight cybercrime.
Read moreCredit to Author: Sergei Shevchenko| Date: Tue, 17 Mar 2020 08:00:58 +0000
Security software frequently blocks “bundleware” installers – software distribution tools that bundle their advertised applications with (usually undesired) additional software – as potentially undesirable applications. But one widely-used software distribution tool for MacOS applications goes to great lengths to avoid being blocked as “bundleware” – using a number of anti-forensics techniques that are more common […]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/n8Txqmat4RA” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Editor| Date: Tue, 25 Feb 2020 13:36:43 +0000
A new APT-style attack combines a bypassing technique with a multi-platform payload to target both Windows and Linux cloud workloads. Stop the attack with technical advice from Sophos.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/q61MwUx5OsI” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Paul Ducklin| Date: Tue, 18 Feb 2020 13:32:46 +0000
HTTPS web encryption – blessing or curse? A new SophosLabs report looks at how much the crooks love TLS.<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/2I1AdG1EeE4″ height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Paul Ducklin| Date: Fri, 07 Feb 2020 16:35:28 +0000
When you need a vulnerability to exploit, but there isn’t one… why not simply bring your own, along with your malware?<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/x9tpCryFXTA” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Paul Ducklin| Date: Fri, 07 Feb 2020 16:35:28 +0000
When you need a vulnerability to exploit, but there isn’t one… why not simply bring your own, along with your malware?<img src=”http://feeds.feedburner.com/~r/nakedsecurity/~4/x9tpCryFXTA” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Andrew Brandt| Date: Thu, 06 Feb 2020 15:22:24 +0000
Sophos has been investigating two different ransomware attacks where the adversaries deployed a legitimate, digitally signed hardware driver in order to delete security products from the targeted computers just prior to performing the destructive file encryption portion of the attack. The signed driver, part of a now-deprecated software package published by Taiwan-based motherboard manufacturer Gigabyte, […]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/uepwaOU8_Ek” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Jörg Schindler| Date: Wed, 18 Dec 2019 11:01:15 +0000
Die Bedrohungslandschaft hat sich im abgelaufenen Jahr mehrfach stark verändert. Anlass genug also, immer wieder neu in die Zukunft zu blicken, um das Verständnis dieser Trends zu schärfen und um sich als Unternehmen in der Cybersicherheit gut aufzustellen. Fünf Experten von Sophos haben einen genauen Blick auf die wichtigsten Security-Faktoren geworfen, die sich 2020 maßgeblich […]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/9IQwSaFgKHY” height=”1″ width=”1″ alt=””/>
Read moreCredit to Author: Andrew Brandt| Date: Thu, 23 Jan 2020 00:22:26 +0000
The SophosLabs Offensive Security team answers your questions about the CVE-2020-0601 (aka Chain of Fools and Curveball) vulnerability.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/682tR8CBAA8″ height=”1″ width=”1″ alt=””/>
Read more