Il malware Baldr attacca i gamer, l’analisi di Sophos

Credit to Author: Tiziana Carboni| Date: Tue, 03 Sep 2019 14:19:05 +0000

Il malware Baldr è un mostro di Frankenstein formato da diversi frammenti di codice e, nonostante non sia più disponibile sul mercato (deep web), può essere ancora utilizzato da chi l’aveva precedentemente acquistato<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/y4sm_D92i08″ height=”1″ width=”1″ alt=””/>

Read more

Avviso agli sviluppatori: sono arrivate le API dei SophosLabs!

Credit to Author: Sophos Italia| Date: Fri, 28 Jun 2019 05:55:48 +0000

I SophosLabs vi invitano a unirvi all’Early Access Program per la loro nuova piattaforma di threat intelligence e threat analysis, SophosLabs Intelix<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/bJpxBkyZPP4″ height=”1″ width=”1″ alt=””/>

Read more

Server al sicuro grazie a Sophos Intercept X con EDR

Credit to Author: Tiziana Carboni| Date: Thu, 30 May 2019 19:36:02 +0000

Sophos ottimizza Intercept X per Server con l’Endpoint Detection e Response (EDR) per supportare le aziende di ogni dimensione nella guerra alle minacce informatiche<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/V1BzRvSW1xk” height=”1″ width=”1″ alt=””/>

Read more

GandCrab 101: All about the most widely distributed ransomware of the moment

Credit to Author: Luca Nagy| Date: Tue, 05 Mar 2019 14:00:10 +0000

In this Sophos101 report, we’ll give you the lowdown on what you need to know about this, unfortunately, widely disseminated malware.<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/QbQ2o1iJn68″ height=”1″ width=”1″ alt=””/>

Read more

Emotet 101, stage 5: a delivery vehicle for more malware

Credit to Author: Andrew Brandt| Date: Tue, 05 Mar 2019 13:59:17 +0000

By SophosLabs Research Emotet is a botnet in its own right, one so prolific and dominant that the United States CERT, the body tasked with tracking cyberthreats to the country, named Emotet in July, 2018 &#8220;among the most costly and destructive malware&#8221; to affect governments, enterprises and organizations large and small, and individual computer users. [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/A9JdHdI4I94″ height=”1″ width=”1″ alt=””/>

Read more

Emotet 101, stage 4: command and control

Credit to Author: Andrew Brandt| Date: Tue, 05 Mar 2019 13:58:33 +0000

By SophosLabs Research The Emotet family could not do what it does without receiving a constant stream of instructions from its owners, or in the absence of the detailed level of feedback about its operating environment each bot sends home from an infected host machine. It also uses huge numbers of compromised websites that belong [&#8230;]<img src=”http://feeds.feedburner.com/~r/sophos/dgdY/~4/tuvtIYBP4JI” height=”1″ width=”1″ alt=””/>

Read more