Build strong digital defenses for your entire family
The month of June is a time for fun in the sun and a break from the school year, but...
The month of June is a time for fun in the sun and a break from the school year, but...
The month of June is a time for fun in the sun and a break from the school year, but...
A $2.4 billion contract awarded last year to tech company Leidos last year for a project to support CISA was...
Last year, we made Sophos DNS Protection available to all Sophos Firewall Xstream Protection customers for no extra charge, and...
For the 14th consecutive year, numerous women from Sophos have been named to CRN’s prestigious Women of the Channel. This...
Apple earlier this year settled a years-long class-action lawsuit accusing Siri, its voice-activated AI assistant, of violating users’ privacy by...
By Byron V. Acohido Every year at RSAC, the cybersecurity conversation swells with new terms, emerging threats, and fresh takes...
A year after Microsoft announced passkeys support for consumer accounts, the tech giant has announced a big change that pushes...
Table of Contents Ransomware Evolution Payment Rates Types of Ransomware Attack Vectors TTPs Victimology As we approach the one year...
Walking the floor of the RSA Conference (RSAC) this year, amid the sea of booths packed with flashing monitors, cybersecurity...
This year marks the fifth year of the celebrated fifth anniversary of the Sophos Active Adversary Report. A simple query...
A recent study by cybersecurity company Abnormal Security revealed a 30% increase in the volume of phishing emails directed at...
Over the recent twelve months, deceptive cross-channel strikes have become more noticeable as a burgeoning strategy among antagonists. These maneuvers...
Annually, numerous security service providers – such as Sophos – enlist for MITRE’s ATT&CK Evaluations: Corporate, a comprehensive cyber attack...
A new year, a new MITRE assessment. The kind individuals at MITRE have once again provided security vendors a chance...