• Produits
  • Pour les entreprises
    Pour les particuliers
    Pour les entreprises
    Obtenir un tarif
    Essais gratuits
    Réseau
    XG Firewall
    L’ultime solution Next-Gen.
    SG UTM
    La solution ultime en matière de sécurité réseau.
    Secure Wi-Fi
    Sécurité ultra puissante pour un Wi-Fi ultra puissant.
    Secure Web Gateway
    Une protection complète du Web, partout.
    Utilisateur
    Intercept X Endpoint
    Protection endpoint inégalée.
    Sophos Mobile
    Des mobiles innombrables, une solution unique.
    SafeGuard Encryption
    Protégez vos données en tous lieux.
    Email
    Secure Email Gateway
    Une protection simple contre un problème complexe.
    Phish Threat
    Simulation d’emails de phishing et formation des utilisateurs.
    Serveur
    Intercept X for Server
    Protection des serveurs Cloud et locaux.
    Obtenir un tarif
    Essais gratuits
    Sophos Central
    Administrez notre plateforme Synchronized Security complète depuis une seule console.
    Commencer un essai gratuit
    Pour les particuliers
    Sophos Home

    Sécurité avancée, filtres web et suppression des virus pour les ordinateurs personnels.

    En savoir plus Essai gratuit

    Outils gratuits

    Sécurité des ordinateurs, des mobiles et des réseaux, entièrement gratuite.

    Téléchargements

  • Labs
  • Partenaires
  • Support
  • Entreprise
  • Downloads
    Essais gratuits
    Toutes les évaluations produits au même endroit.
    Outils gratuits
    Essayez nos outils pour une utilisation à domicile.
    Obtenir un tarif
    Un tarif juste, sur-mesure.
  • Essais gratuits
    Toutes les évaluations produits au même endroit.
    Outils gratuits
    Essayez nos outils pour une utilisation à domicile.
    Obtenir un tarif
    Un tarif juste, sur-mesure.
  • Search
  • Connexion
  • APPLIS
    Sophos Central
    Sophos Home

    SERVICES
    Forums de support
    Portail Partenaires
    Portail Licences
    (MySophos)
  • Connexion
  • APPLIS

    Sophos Central
    Sophos Home

    SERVICES

    Forums de support
    Portail Partenaires
    Portail Licences
    (MySophos)
  • Analyse des menaces
  • Tableau de bord sur les menaces
  • Essais gratuits
  • Obtenir un tarif
  • Outils gratuits

Technical Papers

Here you will find a range of papers aimed at system administrators and security specialists on a variety of topical issues. Some of these papers have been presented at security seminars and technical conferences around the world.

SophosLabs 2019 Threat Report

Victories against cybercrime demand radical change to defense.

View Research

SophosLabs 2018 Malware Forecast

In this report, we review malicious activity SophosLabs analyzed and protected customers against in 2017 and use the findings to predict what might happen in 2018.

View Research

Your handy guide to machine learning at Sophos

Sophos data scientists have written several articles about how machine learning works, how it will be applied to Sophos, and what that will mean for customers. This is a handy guide to that content.

View Research

Machine Learning: How to Build a Better Threat Detection Model

A look at how Sophos develops its machine learning models. Here, we explain the concepts and show the development and evaluation of a toy model meant to solve the very real problem of detecting malicious URLs.

View Research

Ransomware as a Service (RaaS): Deconstructing Philadelphia

Kits available on the Dark Web allow the least technically savvy among us to do evil. Philadelphia is one of the slickest, most chilling examples.

View Research

CVE-2017-0199: life of an exploit

The normal lifecycle of an Office exploit starts with the initial use in targeted attacks. Then, at some point, the information leaks out and cybercrime groups start using it more widely. Offensive security researchers then start experimenting with AV evasion, and the exploit finally ends up in underground exploit builders. Normally this cycle can take a few months. In the case of the CVE-2017-0199 Word exploit, we have observed this in a much more accelerated time scale.

View Research

BetaBot Configuration Data Extraction

This paper explores the inner workings of Betabot, including capabilities of the associated botnet server components and technical detail on how to extract and decrypt configuration data.

View Research

Looking ahead: SophosLabs malware forecast for 2017

Attackers set their sights on the Internet of Things, Android and MacOS devices in this look ahead for 2017.

View Research

AKBuilder – The crowdsourced exploit kit

Document exploitation remains a favorite attack technique for distributing malicious content because it is easier to trick victims into opening document attachments than executables. Exploited documents have the added benefit of not requiring victims to manually enable macros, as is often the case for VBA downloaders. 

View Research

Ancalog – the vintage exploit builder

Document exploitation is a popular method of distributing malware in the malware community. Even though it was never the most prevalent infection vector, document exploitation has been on the rise for the last few years, hiding in the shadow of the more seasonal VBA or JavaScript downloaders. This technical paper explores why we're seeing more document exploitation malware in the wild, as well as the long-standing popularity of the document exploitation generator Ancalog, which is widely commercially available, and its various applications in cybercrime.

View Research

Cryptomining malware on NAS servers

A couple of years ago, coin mining was a bubbling story. There were many threats that used infected machines to mine cryptocurrencies at the expense of the victim. The idea was perfect from the criminal's point of view, but as time went on the average PC was no longer powerful enough to mine even a single coin. It was time to give up on this type of attack and turn the attention to other ways to make money, like ransomware. Recently a new malware family has found a way to use PCs efficiently to mine new types of cryptocurrency. In this paper we examine this new trend.

View Research
Sujets populaires
  • Évaluations gratuites
  • Outils gratuits
  • Livres blancs
  • Articles spécialisés
  • Acheter en ligne
  • Sophos HOME
Communauté
  • Sophos News
  • Réseaux sociaux
  • Actualité Naked Security
  • Podcasts
  • RSS
  • Sophos Brand Store
Travailler avec nous
  • Devenir partenaire
  • Portail Partenaires (connexion)
  • Revendeurs
  • OEM
À propos de Sophos
  • Emploi
  • Produits
  • Commentaires
  • Nous contacter
  • Presse
Support
  • Extensions de garantie
  • Base de connaissances
  • Téléchargements
  • Documentation
  • Services professionnels
  • Formation

© 1997 - 2019 Sophos Ltd. Tous droits réservés.

  • Français
    • 简体中文
    • český
    • English
    • Français
    • Deutsch
    • Magyar
    • Italiano
    • 日本語
    • 한국의
    • Polski
    • Portuguese
    • Español
    • 繁體中文
    • Turkish
  • Mentions légales
  • Confidentialité
  • Informations sur les cookies
Ce site utilise des cookies. En continuant votre navigation sur ce site, vous acceptez l’utilisation des cookies. En savoir plus Continuer
1 of 5