Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team.More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data.More

IP-Adresse prüfen


If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty



127.0.0.1

Es ist ein Fehler aufgetreten. Bitte versuchen Sie es später erneut.

Die SophosLabs pflegen Listen verdächtiger IP-Adressen, bei denen es sich möglicherweise um Spamquellen handelt.

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Meet a SophosLabs Researcher

SophosLabs has a talented team of threat researchers and data scientists worldwide.

Latest News

21
Oct

LockBit uses automated attack tools to identify tasty targets

Using renamed copies of PowerShell and Windows'VBscript host and scripts based on PowerShell pen-testing tool, LockBit actors searched for systems with valuable data to hit at small organizations.
14
Oct

They’re back: inside a new Ryuk ransomware attack

After a long lull, Ryuk returns with new tools and tactics.
13
Oct

Top reason to apply October, 2020’s Microsoft patches: Ping of Death Redux

A vulnerability in Windows' TCP/IP driver handling of IPv6 allows denial of service—and possibly remote code execution.
24
Sep

Email-delivered MoDi RAT attack pastes PowerShell commands

Fileless attack scripts an interaction with the clipboard to evade detection
17
Sep

Maze attackers adopt Ragnar Locker virtual machine technique

Under pressure to evade detection by endpoint protection, ransomware criminals try a more radical approach
09
Sep

Faking it: the thriving business of “fake alert” web scams

Tech support scams and "scarevertising" for questionable mobile apps use ad networks to find their unwitting victims.

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
Operations
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics