AIを搭載したエンドポイント保護
Synchronized Security で連係するファイアウォール
クラウドベースの集中管理
The world’s most trusted cloud security platform
高度なウイルスをブロックするAI機能を含む マルウェア、エクスプロイト、ランサムウェア
さまざまな販促支援ツールを一箇所から提供
世界各地のソフォスパートナーを検索
If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty
127.0.0.1
エラーが発生しました。後でもう一度やり直してください。
スパムメール発信元の疑いがある IP アドレスの検索ツールをご利用いただけます。
Submit An Appeal
IP Address Classification Policy
Share your questions, answers, advice and comments about threats in the Sophos Community.
In security we spend a lot of time trying to decipher the future. Where’s the next technology breakthrough? What are cybercriminals going to do next?
Annual threat reports provide an opportunity to look back at significant events of the past 12 months and identify trends for future development, action and protection. Looking back in time a little further helps to provide context for how we arrived at our current situation and why some things are the way they are. A long view of history can point to subtle changes or seismic shifts within an industry.
As much of the world shifted to remote work in 2020, cybercriminals upped their game, devising ways to use the fears and anxieties of organizations and end users against them.
Kingminer is an opportunistic botnet that keeps quiet and flies under the radar. The operators are ambitious and capable, but don’t have endless resources – they use any solution and concept that is freely available, getting inspiration from public domain tools as well as techniques used by APT groups.
The botnet known as MyKings wields a wide range of automated methods to break into servers – all just to install cryptocurrency miners.
An investigation into an attack against a cloud computing server reveals an unusual and innovative way for malware to communicate through Amazon’s firewalls
What defenders should know about the most prevalent and persistent malware families.