Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team.More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data.More

IP Address Lookup

If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty

An error has occurred, please try again later.

SophosLabs maintains lists of IP addresses suspected to be spam sources.

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Meet a SophosLabs Researcher

SophosLabs has a talented team of threat researchers worldwide.

Latest News


Conti ransomware: Evasive by nature

The attackers spreading Conti have switched gears to a completely fileless attack method

Frag out: four remote attack bugs fixed in Microsoft’s February Patch Tuesday

Three TCP/IP bugs and a flaw in Microsoft's DNS server could be leveraged to crash systems or remotely execute code.

Agent Tesla amps up information stealing attacks

Recent updates to this common RAT add new communications methods and subvert the operating system's own defenses

MrbMiner: Cryptojacking to bypass international sanctions

Iran-based "garage startup" cryptojacking operation targets SQL servers

First Patch Tuesday of 2021 brings fix to Windows Defender bug already being exploited

Remote code execution vulnerability in Windows' built-in malware protection allows an attacker to execute code when a crafted file is scanned—one of seven critical bugs addressed in Microsoft's January fix release.

New Android spyware targets users in Pakistan

The apps seem focused on stealing sensitive data from the phones of Pakistani residents

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics