Endpoint protection with artificial intelligence
Firewall with synchronized security built in
24/7 threat hunting, detection, and response
The world’s most trusted cloud security platform
Includes AI to block advanced viruses, malware, exploits, and ransomware.
Maximize your Sophos revenue, all in one place.
Sophos partners near you.
If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty
127.0.0.1
An error has occurred, please try again later.
SophosLabs maintains lists of IP addresses suspected to be spam sources.
Submit An Appeal
IP Address Classification Policy
Share your questions, answers, advice and comments about threats in the Sophos Community.
In security we spend a lot of time trying to decipher the future. Where’s the next technology breakthrough? What are cybercriminals going to do next?
Annual threat reports provide an opportunity to look back at significant events of the past 12 months and identify trends for future development, action and protection. Looking back in time a little further helps to provide context for how we arrived at our current situation and why some things are the way they are. A long view of history can point to subtle changes or seismic shifts within an industry.
As much of the world shifted to remote work in 2020, cybercriminals upped their game, devising ways to use the fears and anxieties of organizations and end users against them.
Kingminer is an opportunistic botnet that keeps quiet and flies under the radar. The operators are ambitious and capable, but don’t have endless resources – they use any solution and concept that is freely available, getting inspiration from public domain tools as well as techniques used by APT groups.
The botnet known as MyKings wields a wide range of automated methods to break into servers – all just to install cryptocurrency miners.
An investigation into an attack against a cloud computing server reveals an unusual and innovative way for malware to communicate through Amazon’s firewalls
What defenders should know about the most prevalent and persistent malware families.