Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team. More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data. More

IP Address Lookup


If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty



127.0.0.1

An error has occurred, please try again later.

SophosLabs maintains lists of IP addresses suspected to be spam sources.

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Meet a SophosLabs Researcher

SophosLabs has a talented team of threat researchers and data scientists worldwide.

Latest News

21
May

Facebook conspiracy theories after Android app tries to “get root”

Facebook's Android app suddenly started making a bid for superuser access. Conspiracy theories popped up like fungi. (It's now fixed.)
01
May

“SamSam” ransomware – a mean old dog with a nasty new trick

Ransomware is still about "pay up or your files get the chop." But the crooks are learning how to squeeze you for larger sums of money...
23
Mar

Crooks infiltrate Google Play with malware in QR reading utilities

They got Google's "Play Protect" approval for a number of apps that were fronts for a barrage of aggressive ads.
01
Feb

Cryptomining – is it the new ransomware? [REPORT]

SophosLabs just published a technical report about cryptomining - on your Android device, via apps from Google Play, no less.
19
Jan

The Google Play “Super Antivirus” that’s not so super at all… [REPORT]

SophosLabs has published a technical report digging into the details of a not-so-super "Super Antivirus" charade on Google Play.
13
Dec

5 ransomware as a service (RaaS) kits – SophosLabs investigates

A look at five RaaS kits and how each is marketed and priced

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
Operations
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics