The 2025 Sophos Active Adversary Report: A Duo’s Journey
This year marks the fifth year of the celebrated fifth anniversary of the Sophos Active Adversary Report. A simple query...
This year marks the fifth year of the celebrated fifth anniversary of the Sophos Active Adversary Report. A simple query...
There are ongoing efforts to exploit two previously patched security weaknesses in the Cisco Smart Licensing Utility, as reported by...
There has been active exploitation of a security loophole in Apache Tomcat which was recently revealed, just 30 hours after...
An ongoing cyber operation associated with North Korea's Lazarus Group has been associated with a fresh scheme that uses fraudulent...
An Eastern European cybercrime syndicate called Insane Malicious has been associated with more than 10 ongoing social media frauds that...
A team handling cyber safety has uncovered that a specific directive within the Microsoft Active Directory Group Protocol intended to...
Reports from VulnCheck reveal that numerous Four-Faith routers are at risk due to default credentials, with over 15,000 devices currently...
On Monday, Cisco revised a notification to alert clients about ongoing exploitation of a ten-year-old vulnerability affecting its Adaptive Security...
The current year has witnessed the highest count of operational ransomware factions on record. In the second quarter, 58 groups...
Adjusting the Active Hours feature enables you to avoid sudden reboots during a period of the day when they will...
The latest version of Sophos Firewall v21 introduces external threat intelligence source integration for the Active Threat Response feature. Initially...
During an ongoing incident response, the Sophos MDR team of threat hunters and intelligence analysts uncovered further proof of a...
"By transitioning from passive 'search' to active 'seek', ChatGPT has brought about a new era in how we engage with...
With hybrid and remote work setups becoming more prevalent in organizations, the proliferation of digital accounts supporting work processes has...
Aggressive adversaries are highly proficient cybercriminals. They utilize hands-on-keyboard and AI-aided techniques to bypass preventative security controls and carry out...