Endpoint protection with artificial intelligence
Firewall with synchronized security built in
24/7 threat hunting, detection, and response
Public cloud visibility and threat response
Includes AI to block advanced viruses, malware, exploits, and ransomware.
Maximize your Sophos revenue, all in one place.
Find Sophos partners worldwide.
If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty
127.0.0.1
An error has occurred, please try again later.
SophosLabs maintains lists of IP addresses suspected to be spam sources.
Submit An Appeal
IP Address Classification Policy
Share your questions, answers, advice and comments about threats in the Sophos Community.
What defenders should know about the most prevalent and persistent malware families.
Challenges the world faces for the coming year, securing data, devices, and people in an increasingly complex environment.
On May 12th, 2017, organizations across the world were attacked by a new, fast-spreading piece of malware we now know as WannaCry. It is now considered one of the most widespread, and notoriously destructive malware attacks in history, halted only by a researcher getting a lucky break, registering a domain name embedded in the malware that unexpectedly acted as a kill switch. But even today, more than two years hence, WannaCry continues to affect thousands of computers worldwide.
Cybersecurity threats have been growing significantly in both volume and sophistication over the past decade. This poses great challenges to malware detection without considerable automation. In this paper, we have proposed a novel approach by extending our recently suggested artificial neural network (ANN)- based model with feature selection using the principal component analysis (PCA) technique for malware detection.
The trend toward active, targeted attacks continues to grow in prominence. Matrix is the latest malware to use these tactics. In this report, SophosLabs takes a deeper look at this low-key, developing ransomware threat.
Victories against cybercrime demand radical change to defense.