RSS
Security Operations
Featured
Phishing
simulations
Sophos X-Ops
Training
Phake phishing: Phundamental or pholly?
Sophos Insights
Email
email security
featured
Sophos Email
Spam
From inbox clutter to costly compromise: Why email threats still matter
Cybersecurity Awareness Month
MFA
National Cyber Security Awareness Month
password tips
ransomware tips
Cybersecurity Awareness Month: 10 tips to Stay Safe Online that anyone can use
Products & Services
cybersecurity education
Education
Ransomware
state of ransomware
K-12 schools face cybersecurity risks inside and outside of the classroom
Threat Research
.svg
Scalable vector graphics
Scalable Vector Graphics files pose a novel phishing threat
CloudFlare
FlowerStorm
legitimate service abuse
phishing-as-a-service
Rockstar
Rockstar2FA
Sophos MDR
Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces
Atera
MDR
MuddyWater
RMM
STAC 1171
TA450
Sophos MDR blocks and tracks activity from probable Iranian state actor “MuddyWater”
QR code
Quishing
spearphishing
x-ops
From QR to compromise: The growing “quishing” threat
election
fraud
Telegram
Phishing, BEC attackers target candidates in local election, among others