Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team.More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data.More

IP Address Lookup

If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty

An error has occurred, please try again later.

SophosLabs maintains lists of IP addresses suspected to be spam sources.

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Meet a SophosLabs Researcher

SophosLabs has a talented team of threat researchers worldwide.

Latest News


Beware fake online trading apps, on iOS as well as Android

All that glisters is not gold/Often have you heard that told/Gilded tombs do worms enfold

Fake Android and iOS apps disguise as trading and cryptocurrency apps

Criminals have published hundreds of bogus banking, finance, and cryptocurrency apps that steal your money

A defender’s view inside a DarkSide ransomware attack

What to expect when you're targeted by a headline-seeking threat actor

May’s Patch Tuesday brings a lighter-than-usual number of Windows updates

Fewer patches does not make the bugs less dangerous

New Lemon Duck variants exploiting Microsoft Exchange Server

In March, Microsoft published a set of critical fixes to Exchange Server following the discovery of  ProxyLogon–an exploit that was stolen or leaked from researchers within hours of its disclosure to Microsoft. The exploit is now widely available to cybercriminals, and unpatched and vulnerable Microsoft Exchange Servers continue to attract many threat actors to install cryptocurrency-miners, […]

Intervention halts a ProxyLogon-enabled attack

A late charge by a cavalry of reinforcements prevented the attackers from causing greater harm

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics