Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team.More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data.More

Recherche des adresses IP


If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty



127.0.0.1

Une erreur s'est produite, veuillez réessayer plus tard.

Les SophosLabs maintiennent des listes d'adresses IP soupçonnées d'être des sources de spam.

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Meet a SophosLabs Researcher

SophosLabs has a talented team of threat researchers and data scientists worldwide.

Latest News

06
Aug

Baldr vs The World: A SophosLabs report

A new stealer enjoys a wild ride, but is it a flash in the pan or a long term threat?
18
Jul

A new Equation Editor exploit goes commercial, as maldoc attacks using it spike

Weaponized RTF documents adopt CVE-2018-0798, another Equation Editor vulnerability
11
Jul

‘Oto Gonderici’ Excel formula injections target Turkish victims

A criminal relentlessly attacks Turkish targets with a novel maldoc trick, mostly staying under the radar
09
Jul

16 critical vulnerabilities, some being exploited, fixed in July, 2019 Windows updates

Russian hackers allegedly have been exploiting two vulnerabilities in the course of attacks
09
Jul

CVE-2019-0888: Use-After-Free in Windows ActiveX Data Objects (ADO)

Details of the vulnerability we reported to Microsoft and was fixed in last month's Patch Tuesday
01
Jul

BlueKeep PoC demonstrates risk of Remote Desktop exploit

If you've been deferring installing Microsoft's May monthly update rollup, now's a good time to get started - even if you're still using XP for some reason

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
Operations
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics