Malware actual

Datos en tiempo real de las principales amenazas de malware, proporcionados por nuestro galardonado equipo de SophosLabs.Más

Amenazas de spam actuales

Sophos monitoriza todas las fuentes de spam, a diario. Consulte nuestro dashboard de spam para obtener información en tiempo real.Más

IP Address Lookup

If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty

An error has occurred, please try again later.

SophosLabs maintains lists of IP addresses suspected to be spam sources.

IP Address Classification Policy

Concienciación sobre amenazas

Comparta sus dudas, respuestas, consejos y comentarios sobre amenazas en Sophos Community.

El reto de la inteligencia artificial

¿Es usted más inteligente que una máquina? Pruebe nuestro juego para averiguarlo.

Latest News


Nearly a quarter of malware now communicates using TLS

Encryption is one of the strongest weapons malware authors can leverage: They can use it to obfuscate their code, to prevent users (in the case of ransomware) from being able to access their files, and for securing their malicious network communication. As websites and apps more widely adopt TLS (Transport Layer Security) and communicate over […]

February, 2020 Patch Tuesday brings a century of updates to Microsoft, Adobe products

For this second Patch Tuesday of 2020, Microsoft has released a hundred patches to Windows and other Microsoft software, including 12 vulnerabilities flagged as Critical, and 87 flagged as Important. In addition, Adobe also published updates for its Flash Player, Acrobat, Framemaker, Experience Manager, and Digital Editions products in notifications timed to coincide with Microsoft’s […]

RobbinHood – the ransomware that brings its own bug

When you need a vulnerability to exploit, but there isn't one... why not simply bring your own, along with your malware?

Living off another land: Ransomware borrows vulnerable driver to remove security software

Sophos has been investigating two different ransomware attacks where the adversaries deployed a legitimate, digitally signed hardware driver in order to delete security products from the targeted computers just prior to performing the destructive file encryption portion of the attack. The signed driver, part of a now-deprecated software package published by Taiwan-based motherboard manufacturer Gigabyte, […]

CVE-2020-0601 Q&A

The SophosLabs Offensive Security team answers your questions about the CVE-2020-0601 (aka Chain of Fools and Curveball) vulnerability.

Applying threat intelligence to Iranian cyberattack risk

As geopolitical interest increases, discussions of threat intelligence increase which increases pressure on security operations teams to provide answers to customers and to senior leadership.

Resumen de SophosLabs

Data Science
  • Desarrollo de modelos machine learning
  • Investigación de inteligencia artificial, liderazgo intelectual
Threat Intelligence
  • Rápida repuesta ante amenazas y escaladas
  • Investigación en profundidad de perfiles de ataques y amenazas
  • Automatización de análisis y respuesta ante amenazas
  • Pruebas, análisis y métricas de control de calidad.