Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team.More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data.More

IP アドレスの検索


If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty



127.0.0.1

エラーが発生しました。後でもう一度やり直してください。

スパムメール発信元の疑いがある IP アドレスの検索ツールをご利用いただけます。

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Meet a SophosLabs Researcher

SophosLabs has a talented team of threat researchers and data scientists worldwide.

Latest News

18
Nov

Sophos’ 2021 threat report highlights a path forward

Sophos' annual roundup of the security threats that demand attention in 2021
10
Nov

November Patch Tuesday fixes close 112 holes—including one already being exploited

An "in the wild" kernel exploit, browser bugs, and 15 Azure Sphere vulnerabilities are among the 112 security fixes issued by Microsoft in the November 2020 update.
04
Nov

A new APT uses DLL side-loads to “KilllSomeOne”

A group of targeted attacks takes a different spin on methods first seen in PlugX APT operations.
28
Oct

Hacks for sale: inside the Buer Loader malware-as-a-service

A year after its debut, Buer's modular loader rises as an alternative to Emotet and Trickbot's Bazar.
21
Oct

LockBit uses automated attack tools to identify tasty targets

Using renamed copies of PowerShell and Windows'VBscript host and scripts based on PowerShell pen-testing tool, LockBit actors searched for systems with valuable data to hit at small organizations.
14
Oct

They’re back: inside a new Ryuk ransomware attack

After a long lull, Ryuk returns with new tools and tactics.

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
Operations
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics