Sophos Acquires Braintrace

Credit to Author: Joe Levy| Date: Thu, 22 Jul 2021 13:00:04 +0000

Further Enhancing Sophos’ Adaptive Cybersecurity Ecosystem with Network Detection and Response (NDR) technology<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/2tfduEGnFkA” height=”1″ width=”1″ alt=””/>

Read more

Sophos Acquires Capsule8

Credit to Author: Dan Schiappa| Date: Wed, 07 Jul 2021 13:00:45 +0000

Adding new Linux server and container security capabilities to the Sophos portfolio<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/bsbxws2nq-4″ height=”1″ width=”1″ alt=””/>

Read more

MTR in Real Time: Hand-to-hand combat with REvil ransomware chasing a $2.5 million pay day

Credit to Author: Tilly Travers| Date: Wed, 30 Jun 2021 12:30:47 +0000

A few weeks ago, a mid-sized, 24/7 media company that had moved critical activities online during the pandemic, found itself locked in live combat with REvil ransomware attackers determined to secure a multi-million-dollar pay-out. The attack failed, but the company has yet to fully recover. In early June 2021, a detection of Cobalt Strike on [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/GaLU13-WJn8″ height=”1″ width=”1″ alt=””/>

Read more

What to expect when you’ve been hit with REvil ransomware

Credit to Author: Tilly Travers| Date: Wed, 30 Jun 2021 12:30:11 +0000

REvil, also known as Sodinokibi, is a widely used, conventional ransomware-as-a-service (RaaS) offering that has been around since 2019. Criminal customers can lease the REvil ransomware from its developers, adding their own tools and resources for targeting and implementation. As a result, the approach and impact of an attack involving REvil ransomware is highly variable. [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/vTf9wLrAhwI” height=”1″ width=”1″ alt=””/>

Read more

MTR in Real Time: Pirates pave way for Ryuk ransomware

Credit to Author: Tilly Travers| Date: Thu, 06 May 2021 13:00:21 +0000

Sophos’ Rapid Response team was recently brought in to contain and neutralize an attack involving Ryuk ransomware. The target was a European biomolecular research institute involved in COVID-19 related research as well as other activities related to the life sciences. The institute has close partnerships with local universities and works with students on various programs. [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/6pSQ_YkCBSQ” height=”1″ width=”1″ alt=””/>

Read more

HAFNIUM: Advice about the new nation-state attack

Credit to Author: Seth Geftic| Date: Fri, 05 Mar 2021 23:37:38 +0000

On March 2nd, zero-day vulnerabilities affecting Microsoft Exchange were publicly disclosed. These vulnerabilities are being actively exploited in the wild by HAFNIUM, a threat actor believed to be a nation state. What is HAFNIUM? According to a CISA alert: Microsoft has released out-of-band security updates to address vulnerabilities affecting Microsoft Exchange Server 2013, 2016, and [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/RZOgaCbnoZ8″ height=”1″ width=”1″ alt=””/>

Read more