Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team. More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data. More

IP Address Lookup


If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty



127.0.0.1

An error has occurred, please try again later.

SophosLabs maintains lists of IP addresses suspected to be spam sources.

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Meet a SophosLabs Researcher

SophosLabs has a talented team of threat researchers and data scientists worldwide.

Latest News

24
May

Directed attacks against MySQL servers deliver ransomware

Someone is attacking internet-facing Windows database servers with GandCrab ransomware
14
May

May, 2019 Patch Tuesday addresses critical remote desktop, DHCP bugs

The vulnerabilities were so potentially harmful, Microsoft released updates for no-longer-supported Windows XP and Server 2003
10
May

MegaCortex, deconstructed: mysteries mount as analysis continues

An update to last week's late-breaking information about this novel ransomware
03
May

“MegaCortex” ransomware wants to be The One

The sudden appearance of a new ransomware on a large number of enterprise networks was not the May Day gift anyone wanted
01
May

How Anubis uses Telegram (and Chinese characters) to phone home

The ubiquitous Android bank credential thief tries new methods to conceal where it gets its instructions from
30
Apr

A taste of the onslaught at the network’s edge

Edge devices take a licking so the rest of the network can keep on ticking, but they do need a little extra TLC

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
Operations
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics