Microsoft pushes fixes for 44 more vulnerabilities in August Patch Tuesday update

Credit to Author: gallagherseanm| Date: Tue, 10 Aug 2021 17:22:49 +0000

A publicly-disclosed remote Print Spooler exploit, and bugs in JScript and NFS, lead the list of the most concerning CVEs.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/B7ksuwCr3Ok” height=”1″ width=”1″ alt=””/>

Read more

BlackMatter ransomware emerges from the shadow of DarkSide

Credit to Author: Mark Loman| Date: Mon, 09 Aug 2021 16:00:43 +0000

On Friday May 7, 2021, an affiliate of the DarkSide Ransomware-as-a-Service (RaaS) hit Colonial Pipeline, a major U.S. fuel pipeline. The attack led to widespread supply disruption, global headlines, and intense scrutiny by the national authorities. A week later, DarkSide announced it was shutting down its operations after its servers were allegedly seized and its [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/cP0-K9En8Kc” height=”1″ width=”1″ alt=””/>

Read more

Trash Panda as a Service: Raccoon Stealer steals cookies, cryptocoins, and more

Credit to Author: Yusuf Polat| Date: Tue, 03 Aug 2021 12:30:29 +0000

Cookie and credential stealing malware-as-a-service delivered by dropper-as-a-service now packs a “clipper” to steal crypto-transactions, and can drop other malware.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/MRtgYbAYFWs” height=”1″ width=”1″ alt=””/>

Read more

Sophos is (officially!) a Great Place to Work

Credit to Author: harrietstone| Date: Tue, 08 Jun 2021 09:35:23 +0000

While those of us who work here already know Sophos is a great employer, I’m excited to share that Sophos US has officially been certified as a Great Place to Work! Great Place to Work certification is particularly valuable as it is the only official US recognition based entirely on direct employee feedback. All Sophos [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/YkgKPJxdzdg” height=”1″ width=”1″ alt=””/>

Read more

New Lemon Duck variants exploiting Microsoft Exchange Server

Credit to Author: rajeshnataraj| Date: Fri, 07 May 2021 12:30:35 +0000

In March, Microsoft published a set of critical fixes to Exchange Server following the discovery of  ProxyLogon–an exploit that was stolen or leaked from researchers within hours of its disclosure to Microsoft. The exploit is now widely available to cybercriminals, and unpatched and vulnerable Microsoft Exchange Servers continue to attract many threat actors to install cryptocurrency-miners, [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/f5mbGzsxNSo” height=”1″ width=”1″ alt=””/>

Read more

SolarWinds breach: how to identify if you have been affected

Credit to Author: Ross McKerchar| Date: Mon, 14 Dec 2020 15:15:19 +0000

** We will update this article with additional information as it becomes available. Check back regularly for further updates. ** SolarWinds, an IT monitoring specialist, reported last Sunday that it had fallen victim to a “highly-sophisticated, manual supply chain attack &#8230; likely by a nation state.” The compromised products are SolarWinds Orion versions 2019.4 through [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/s-MEKpRJ9P0″ height=”1″ width=”1″ alt=””/>

Read more