Memory scanning leaves attackers nowhere to hide
Credit to Author: Matt Wixey| Date: Thu, 09 Nov 2023 13:46:19 +0000
Sophos X-Ops takes an in-depth look at memory scanning and why it matters
Read moreCredit to Author: Matt Wixey| Date: Thu, 09 Nov 2023 13:46:19 +0000
Sophos X-Ops takes an in-depth look at memory scanning and why it matters
Read moreCredit to Author: rajeshnataraj| Date: Thu, 19 Oct 2023 11:00:35 +0000
Multiple LockBit knock-off attacks in September targeting obsolete software foiled, exposing tactics and tools.
Read moreCredit to Author: gallagherseanm| Date: Mon, 18 Sep 2023 10:15:27 +0000
Liquidity mining scam puts cruel new spin on Chinese cryptocurrency fraud, with a dash of AI chat
Read moreCredit to Author: Matt Wixey| Date: Tue, 29 Aug 2023 10:00:17 +0000
We explore some of the entries in recent cybercrime research competitions, and what they say about threat actor innovation and priorities
Read moreCredit to Author: Sally Adam| Date: Wed, 23 Aug 2023 11:29:54 +0000
With 90% of ransomware attacks occurring outside standard business hours, Sophos’ 24/7 Managed Detection and Response (MDR) service is now an essential part of an effective security stack.
Read moreCredit to Author: Angela Gunn| Date: Wed, 23 Aug 2023 10:01:02 +0000
A deep dive into incident-response cases from the first half of this year finds both attackers and defenders picking up the pace
Read moreCredit to Author: Andrew Brandt| Date: Thu, 10 Aug 2023 10:00:10 +0000
A social engineering phone call lends authenticity to the attacker’s malicious email
Read moreCredit to Author: Chester Wisniewski| Date: Tue, 08 Aug 2023 10:01:37 +0000
Naming and shaming the bad guys can be gratifying, but for practical protection, Threat Activity Clusters are the way
Read more