Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team. More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data. More

IP Address Lookup


If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty



127.0.0.1

An error has occurred, please try again later.

SophosLabs maintains lists of IP addresses suspected to be spam sources.

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Meet a SophosLabs Researcher

SophosLabs has a talented team of threat researchers and data scientists worldwide.

Latest News

02
Oct

The price of a cheap mobile phone may include your privacy

Inexpensive mobile phones may be subject to "supply chain compromise," with Trojaned third party apps. We look at a phone that shipped with factory-installed malware
24
Sep

Cryptojacking apps return to Google Play Market

At least 25 Android apps on the official Google Play store contain code that mines cryptocurrencies in the background.
21
Sep

The persistent nuisance of cryptomining looks set to grow

Victims do all the work and pay for the electricity, while criminals reap the rewards
19
Sep

Microsoft’s September patches fix a raft of serious bugs

Updates for Windows and Mac users resolve more than five dozen software vulnerabilities
11
Sep

Malicious doc “builders” abandon old exploits wholesale

A key piece of the malware ecosystem adopts new vulnerabilities, and scraps old exploits, in record time
21
Aug

Intercept X defends against SettingsContent-ms abuse (video)

Even using an older version of our anti-exploit technology will protect you if you open a malicious document with the CVE-2018-8414 exploit embedded in it

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
Operations
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics