Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team.More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data.More

IP Address Lookup

If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty

An error has occurred, please try again later.

SophosLabs maintains lists of IP addresses suspected to be spam sources.

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Meet a SophosLabs Researcher

SophosLabs has a talented team of threat researchers and data scientists worldwide.

Latest News


Lemon_Duck cryptominer targets cloud apps & Linux

An aggressive cryptojacker tests new exploits as it rapidly adopts upgraded features

Truth-in-advertising policy fails to curb fleeceware

More restrictive rules about how publishers offer subscriptions may alleviate some fleeceware problems

Color by numbers: inside a Dharma ransomware-as-a-service attack

Dharma, a family of ransomware first spotted in 2016, continues to be a threat to many organizations—especially small and medium-sized businesses. Part of the reason for its longevity is that its variants have become the basis for ransomware-as-a-service (RaaS) operations—the fast-food franchise of cybercrime. Three recent attacks documented by SophosLabs and Sophos MTR have revealed […]

The 1337est Print Spooler bug fixed in August, 2020’s Patch Tuesday

Windows fixes address 60 privilege escalations and 33 remote code execution bugs

The realities of ransomware: Five signs you’re about to be attacked

A manager on the Managed Threat Response team explains what to expect when you're expecting a ransomware attack

The realities of ransomware: The evasion arms race

Behavioral shifts changed the ransomware landscape as criminals challenge defenses

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics