Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team.More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data.More

Recherche des adresses IP


If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty



127.0.0.1

Une erreur s'est produite, veuillez réessayer plus tard.

Les SophosLabs maintiennent des listes d'adresses IP soupçonnées d'être des sources de spam.

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Découvrez nos chercheurs des SophosLabs

Les SophosLabs sont composés d’une équipe internationale de chercheurs en menaces informatiques et d’analystes de données talentueux.

Latest News

11
Jun

Relentless REvil, revealed: RaaS as variable as the criminals who use it

No two criminal groups deploy the ransomware-as-a-service, also known as Sodinokibi, in exactly the same way
08
Jun

Six in-the-wild exploits patched in Microsoft’s June security fix release

Security fixes address five critical vulnerabilities, including scripting and Defender bugs—and one actively exploited flaw in MSHTML.
02
Jun

AMSI bypasses remain tricks of the malware trade

Malware developers continue to try to sabotage or evade Microsoft's Anti-Malware Software Interface in "fileless" and living-off-land attacks.
28
May

A new ransomware enters the fray: Epsilon Red

A bare-bones ransomware offloads most of its functionality to a cache of PowerShell scripts
12
May

Beware fake online trading apps, on iOS as well as Android

All that glisters is not gold/Often have you heard that told/Gilded tombs do worms enfold
12
May

Fake Android and iOS apps disguise as trading and cryptocurrency apps

Criminals have published hundreds of bogus banking, finance, and cryptocurrency apps that steal your money

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
Operations
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics