March 29, 2023 Updated: 3CX users under DLL-sideloading attack: What you need to know A Trojanized version of the popular VOIP/PBX software is in the news; here’s what hunters and defenders are doing Threat Research
March 21, 2023 Sophos Partners with Cowbell Providing Small and Medium Enterprises with streamlined access to cyber insurance coverage and facilitating optimal insurance provision for Sophos customers in the U.S. through the opt-in sharing of endpoint health security data. Products & Services
March 16, 2023 Best Practices for Securing Your Firewall While your Sophos Firewall is a security product, it also needs to be secured. Follow these best practices to optimize the security of your network. Products & Services
March 16, 2023 GPT for you and me: Applying AI language processing to cyber defenses Three SophosAI projects harness the model behind ChatGPT for better detection of malicious activity. AI Research
March 15, 2023 Observing OWASSRF Exchange Exploitation… still ProxyNotShell continues to make waves as November 2022 fixes fail to contain SSRF tactic Threat Research
March 14, 2023 Cybersecurity Guide: Securing the Education Sector Sophos helps educational institutions quickly identify and respond to advanced threats, 24x7x365 Products & Services
March 14, 2023 A little something for everyone on a patchwork Patch Tuesday Even MacOS, iOS, and Android get a piece of the pie in March Threat Research
March 09, 2023 A border-hopping PlugX USB worm takes its act on the road Borne aloft by DLL sideloading, a far-flung infection touches ten time zones Threat Research
March 02, 2023 Sophos named a Leader in 2022 Gartner®️ Magic Quadrant™️ for Endpoint Protection Platforms Our 13th consecutive positioning as a Leader for EPP Products & Services
March 02, 2023 A day in the life of a Sophos MDR analyst "It's uber important that our analysts understand the value of providing excellent customer service." Products & Services
February 28, 2023 Sour Grapes: stomping on a Cambodia-based “pig butchering” scam A text message leads to discovery of a vast scam infrastructure run by Chinese cyber-criminals. Threat Research