Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team.More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data.More

IP Address Lookup

If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty

An error has occurred, please try again later.

SophosLabs maintains lists of IP addresses suspected to be spam sources.

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Meet a SophosLabs Researcher

SophosLabs has a talented team of threat researchers and data scientists worldwide.

Latest News


The WannaCry hangover

More than two years on, modified WannaCry variants still cause headaches for IT admins and security analysts

September, 2019 Patch Tuesday updates a raft of Windows weaknesses

With nearly 80 major vulnerabilities addressed, this is not an update cycle you want to skip

August, 2019 Patch Tuesday Targets Remote Desktop and Active Directory

Among the 94 vulnerabilities fixed this month by Microsoft, 29 are rated as Critical. Most importantly, the Remote Desktop Protocol (RDP) and its associated service (RDS) collect a total of 6 CVEs, which seems to show a renewed interest in the RDP protocol by vulnerability researchers; two of those classified as wormable (CVE-2019-1181 and CVE-2019-1182) […]

Baldr vs The World: A SophosLabs report

A new stealer enjoys a wild ride, but is it a flash in the pan or a long term threat?

A new Equation Editor exploit goes commercial, as maldoc attacks using it spike

Weaponized RTF documents adopt CVE-2018-0798, another Equation Editor vulnerability

‘Oto Gonderici’ Excel formula injections target Turkish victims

A criminal relentlessly attacks Turkish targets with a novel maldoc trick, mostly staying under the radar

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics