RSS
Threat Research
STAC6405
infostealer
RMM
Phishing
Incident responders, s'il vous plait: Invites lead to odd malware events
A phishing campaign targeting multiple organizations led to RMM installations – but not much else (yet). A threat actor experimenting, or an access-as-a-service attack underway?
Security Operations
Featured
simulations
Sophos X-Ops
Training
Phake phishing: Phundamental or pholly?
Sophos Insights
Email
email security
Sophos Email
Spam
From inbox clutter to costly compromise: Why email threats still matter
Cybersecurity Awareness Month
MFA
National Cyber Security Awareness Month
password tips
ransomware tips
Cybersecurity Awareness Month: 10 tips to Stay Safe Online that anyone can use
Products & Services
cybersecurity education
Education
Ransomware
state of ransomware
K-12 schools face cybersecurity risks inside and outside of the classroom
.svg
Scalable vector graphics
Scalable Vector Graphics files pose a novel phishing threat
CloudFlare
FlowerStorm
legitimate service abuse
phishing-as-a-service
Rockstar
Rockstar2FA
Sophos MDR
Phishing platform Rockstar 2FA trips, and “FlowerStorm” picks up the pieces
Atera
MDR
MuddyWater
STAC 1171
TA450
Sophos MDR blocks and tracks activity from probable Iranian state actor “MuddyWater”
QR code
Quishing
spearphishing
x-ops
From QR to compromise: The growing “quishing” threat
election
fraud
Telegram
Phishing, BEC attackers target candidates in local election, among others