Sophos

CISA Warns of Attacks Exploiting Sophos Web Appliance Vulnerability

CISA Warns of Attacks Exploiting Sophos Web Appliance Vulnerability 17/11/2023 at 16:20 By Eduard Kovacs CISA adds Sophos, Oracle and Microsoft product security holes to its Known Exploited Vulnerabilities (KEV) catalog. The post CISA Warns of Attacks Exploiting Sophos Web Appliance Vulnerability appeared first on SecurityWeek. This article is an excerpt from SecurityWeek RSS Feed […]

React to this headline:

Loading spinner

CISA Warns of Attacks Exploiting Sophos Web Appliance Vulnerability Read More »

Telemetry gaps leave networks vulnerable as attackers move faster

Telemetry gaps leave networks vulnerable as attackers move faster 16/11/2023 at 09:01 By Help Net Security Telemetry logs are missing in nearly 42% of the attack cases studied, according to Sophos. In 82% of these cases, cybercriminals disabled or wiped out the telemetry to hide their tracks. Gaps in telemetry decrease much-needed visibility into organizations’

React to this headline:

Loading spinner

Telemetry gaps leave networks vulnerable as attackers move faster Read More »

10 corporate cybersecurity blogs worth your time

10 corporate cybersecurity blogs worth your time 14/11/2023 at 09:02 By Help Net Security In this article, we’ve curated a list of insightful corporate cybersecurity blogs that provide analysis and actionable advice to help you keep your company’s digital assets secure. This list is not meant to be exhaustive since thousands of companies have infosec

React to this headline:

Loading spinner

10 corporate cybersecurity blogs worth your time Read More »

Healthcare’s road to redefining cybersecurity with modern solutions

Healthcare’s road to redefining cybersecurity with modern solutions 03/11/2023 at 08:07 By Help Net Security The rate of data encryption following a ransomware attack in healthcare was the highest in the last three years, according to Sophos. Ransomware attacks continue to grow in sophistication Among those organizations surveyed, cybercriminals successfully encrypted data in nearly 75%

React to this headline:

Loading spinner

Healthcare’s road to redefining cybersecurity with modern solutions Read More »

Most dual ransomware attacks occur within 48 hours

Most dual ransomware attacks occur within 48 hours 02/10/2023 at 12:16 By Helga Labus Since July 2023, the Federal Bureau of Investigation (FBI) has noticed a new trend: dual ransomware attacks on the same victim, occurring in close proximity of one another. Dual ransomware attacks Dual ransomware attacks are when against the same victim occurr

React to this headline:

Loading spinner

Most dual ransomware attacks occur within 48 hours Read More »

Covert Delivery of Cobalt Strike Beacon via Sophos Phishing Website

Covert Delivery of Cobalt Strike Beacon via Sophos Phishing Website 15/09/2023 at 17:31 By rohansinhacyblecom Key Takeaways Overview Cyble Research & Intelligence Labs (CRIL) came across a typosquatted domain of  Sophos, “sopbos[.]com”, using a VirusTotal search. The phishing site impersonates the installation of the Sophos Home. The initial infection vector is unclear at this time

React to this headline:

Loading spinner

Covert Delivery of Cobalt Strike Beacon via Sophos Phishing Website Read More »

Cybercriminals use research contests to create new attack methods

Cybercriminals use research contests to create new attack methods 01/09/2023 at 07:17 By Help Net Security Adversary-sponsored research contests on cybercriminal forums focus on new methods of attack and evasion, according to Sophos. The contests mirror legitimate security conference ‘Call For Papers’ and provide the winners considerable financial rewards and recognition from peers and also

React to this headline:

Loading spinner

Cybercriminals use research contests to create new attack methods Read More »

Ransomware group exploits Citrix NetScaler systems for initial access

Ransomware group exploits Citrix NetScaler systems for initial access 29/08/2023 at 14:50 By Helga Labus A known threat actor specializing in ransomware attacks is believed to be behind a recent campaign that targeted unpatched internet-facing Citrix NetScaler systems to serve as an initial foothold into enterprise networks. “Our data indicates strong similarity between attacks using

React to this headline:

Loading spinner

Ransomware group exploits Citrix NetScaler systems for initial access Read More »

Ransomware dwell time hits new low

Ransomware dwell time hits new low 25/08/2023 at 06:34 By Help Net Security Median attacker dwell time—the time from when an attack starts to when it’s detected—shrunk from 10 to eight days for all attacks, and to five days for ransomware attacks during the first half of 2023, according to Sophos. In 2022, the median

React to this headline:

Loading spinner

Ransomware dwell time hits new low Read More »

Black Hat USA 2023 video walkthrough

Black Hat USA 2023 video walkthrough 11/08/2023 at 15:04 By Help Net Security Help Net Security is in Las Vegas this week for Black Hat USA 2023, and this video provides a closer look at the event. The exhibitors featured in this video are: 1Password, Aqua Security, CISA, Cisco, CyberFOX, Darktrace, Dasera, Fortanix, Fortinet, Fortra,

React to this headline:

Loading spinner

Black Hat USA 2023 video walkthrough Read More »

Photos: Black Hat USA 2023

Photos: Black Hat USA 2023 11/08/2023 at 07:47 By Help Net Security Black Hat USA 2023 returned to the Mandalay Bay Convention Center in Las Vegas. The conference featured over 100 selected Briefings, open-source tool demos in the Arsenal, a Business Hall, networking events, and more. Here’s a photo gallery from the event. The featured

React to this headline:

Loading spinner

Photos: Black Hat USA 2023 Read More »

Recent ransomware attacks share curiously similar tactics

Recent ransomware attacks share curiously similar tactics 09/08/2023 at 12:33 By Industry News A series of ransomware attacks made by different groups share curiously similar characteristics, according to Sophos. Sophos released new findings into the connections between the most prominent ransomware groups this past year, including Royal, in its Clustering Attacker Behavior Reveals Hidden Patterns

React to this headline:

Loading spinner

Recent ransomware attacks share curiously similar tactics Read More »

Sophos X-Ops showcases MDR and threat intelligence at Black Hat and DEF CON

Sophos X-Ops showcases MDR and threat intelligence at Black Hat and DEF CON 09/08/2023 at 12:17 By Industry News Sophos has announced that Sophos X-Ops will lead three presentations at Black Hat and DEF CON, taking place this week in Las Vegas. Speaker presentations from Sophos Managed Detection and Response (MDR) security operations experts, threat

React to this headline:

Loading spinner

Sophos X-Ops showcases MDR and threat intelligence at Black Hat and DEF CON Read More »

7 fake cryptocurrency investment apps discovered in Google Play, Apple App Store

7 fake cryptocurrency investment apps discovered in Google Play, Apple App Store 03/08/2023 at 09:47 By Help Net Security Sophos released new findings on CryptoRom scams—a subset of pig butchering schemes designed to trick users of dating apps into making fake cryptocurrency investments. Since May, Sophos X-Ops has observed CryptoRom fraudsters refining their techniques, including

React to this headline:

Loading spinner

7 fake cryptocurrency investment apps discovered in Google Play, Apple App Store Read More »

Refined methodologies of ransomware attacks

Refined methodologies of ransomware attacks 11/05/2023 at 06:34 By Help Net Security Adversaries were able to encrypt data in 76% of the ransomware attacks that were conducted against surveyed organizations, according to Sophos. The survey also shows that when organizations paid a ransom to get their data decrypted, they ended up additionally doubling their recovery

React to this headline:

Loading spinner

Refined methodologies of ransomware attacks Read More »

Scroll to Top