Sophos MDR and Sophos XDR now integrate with Google Workspace
Organizations with distributed workforces are increasingly reliant on cloud-based productivity platforms like Microsoft 365 and Google Workspace for email, file...
Organizations with distributed workforces are increasingly reliant on cloud-based productivity platforms like Microsoft 365 and Google Workspace for email, file...
Jan 25, 2024NewsroomFileless Malware / Endpoint Security Cybersecurity researchers have uncovered an updated version of a backdoor called LODEINFO that's...
Jan 24, 2024The Hacker NewsSaaS Security / Endpoint Security In today's highly distributed workplace, every employee has the ability to...
Jan 24, 2024NewsroomVulnerability / Endpoint Security A critical security flaw has been disclosed in Fortra's GoAnywhere Managed File Transfer (MFT)...
The Endpoint Threat and Technology Landscape is Changing Threat actor groups, insider threats, and nation state actors are developing and...
Last Spring, I announced our partnership with Cowbell that facilitated access to cyber insurance coverage for Sophos customers in the...
Jan 19, 2024NewsroomMalware / Endpoint Security Pirated applications targeting Apple macOS users have been observed containing a backdoor capable of...
In the realm of IT management, ManageEngine has unveiled a pioneering solution, Endpoint Central, which is set to redefine endpoint...
We are delighted to announce that Sophos has been named a Leader in the 2023 Gartner® Magic Quadrant™ for Endpoint...
IGEL, the provider of secure endpoint operating systems (OS), has revealed a novel strategy to redefine secure endpoints in an...
Malware exploits undocumented Google OAuth endpoint to regenerate Google cookies Pierluigi Paganini January 01, 2024 CloudSEK researchers analyzed a zero-day...
Dec 29, 2023NewsroomMalware / Endpoint Security Microsoft on Thursday said it's once again disabling the ms-appinstaller protocol handler by default...
G2 just released their Winter 2024 Reports, and Sophos is the only cybersecurity provider named a Leader across the G2...
Around 60% of human-operated ransomware attacks now involve malicious remote encryption. Read on to learn about this prevalent ransomware attack...
Business transformation is a journey. And the path you take can be as crucial as your endpoint. ...