Memory scanning leaves attackers nowhere to hide
In the first of our new series of technical thought leadership papers, which aim to give readers an in-depth look...
In the first of our new series of technical thought leadership papers, which aim to give readers an in-depth look...
In this post we will be discussing Group Policy attacks, basing the threat hunt on a ransomware investigation undertaken by...
On our new Sophos X-Ops video channel, Robert Weiland of the Incident Response team walks viewers through a data-exfiltration investigation,...
Servers are always a point of interest for threat actors as they are one of the most efficient attack vectors...