Scammers Seize the Opportunity during CrowdStrike Downtime
A recent notable global service disruption led to the offline status of numerous Windows devices. The flawed CrowdStrike security patch....
A recent notable global service disruption led to the offline status of numerous Windows devices. The flawed CrowdStrike security patch....
In recent events, a significant worldwide service disruption rendered multiple Windows devices offline. The root cause of this disruption was...
A recent substantial global disruption led to the offline status of numerous Windows devices. The origin of this disruption was...
A recent widespread outage led to the shutdown of many Windows machines. The cause of the issue was traced back...
Recently, the members of the Sophos Germany team contributed their time to volunteer at a horse therapy farm that offers...
Recently, the US government prohibited the sale of Kaspersky antivirus software in America citing national security concerns. For existing users...
Jul 17, 2024NewsroomVulnerability / Data Protection Malicious actors are actively taking advantage of a recently exposed severe security weakness affecting...
June 21, 2024NewsroomPhishing Attack / Email Security A new phishing attack campaign targeting individuals in Pakistan using a customized backdoor...
Devised by John Tuckner and the crew at automation and AI-fueled workflow platform Tines, the SOC Automation Capability Matrix (SOC...
Jun 21, 2024NewsroomMalware / Malvertising An aggressive advertising campaign is exploiting trojanized installers for well-known applications like Google Chrome and...
June 21, 2024Media CenterVulnerability / Data Security An actively exploited high-severity flaw that has been recently patched affects SolarWinds Serv-U...
Members of the Sophos Wiesbaden team recently donned their running shoes to participate in the 30th J.P. Morgan Corporate Challenge...
The main interface of OneDrive for Web displays significant documents (as identified by the artificial intelligence) at the top, followed...
Recently, my dear mother celebrated her 80th birthday with a grand celebration. Managing over 100 guests, entertainment, and catering required...
Internet Confidentiality and Exploited Fishing Microsoft recently identified state-backed hackers utilizing its generative AI tools to assist in their assaults....