Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team.More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data.More

IP アドレスの検索


If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty



127.0.0.1

エラーが発生しました。後でもう一度やり直してください。

スパムメール発信元の疑いがある IP アドレスの検索ツールをご利用いただけます。

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

SophosLabs リサーチャーのご紹介

SophosLabs には、世界各地に展開する優れた脅威リサーチャーが在籍しています。

Latest News

23
Mar

Black Kingdom ransomware begins appearing on Exchange servers

A novel, if not particularly well made, ransomware is spreading to Exchange servers that haven't been patched against the ProxyLogon exploit
15
Mar

DearCry ransomware attacks exploit Exchange server vulnerabilities

Perhaps not by coincidence, the ransomware's file encryption methodology mimics that of WannaCry.
09
Mar

SophosLabs Offensive Security releases post-exploitation tool for Exchange

A new tool demonstrates how attackers might take advantage of a set of built-in PowerShell scripts
09
Mar

Critical updates dominate March, 2021 Patch Tuesday releases

Fixes urgently required for DNS and Exchange servers, as well as for all desktop Windows machines
04
Mar

Covert code faces a Heap of trouble in memory

Fileless malware, ransomware and remote access agents trying to evade detection by running in memory rely on being able to allocate “Heap” memory – a step just made harder by Sophos
01
Mar

“Gootloader” expands its payload delivery options

The Javascript-based infection framework for the Gootkit RAT increasingly delivers a wider variety of malware, including ransomware payloads, filelessly

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
Operations
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics