Today's Malware

Real-time data on the top malware threats from our award-winning SophosLabs Team. More

Today's Spam Threats

We monitor spam from all sources, every day. View our spam dashboard for real-time data. More

IP Address Lookup

If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty

An error has occurred, please try again later.

SophosLabs maintains lists of IP addresses suspected to be spam sources.

IP Address Classification Policy

Threat Awareness

Share your questions, answers, advice and comments about threats in the Sophos Community.

The AI Challenge

Are you smarter than a machine? Play the game to find out.

Meet a SophosLabs Researcher

SophosLabs has a talented team of threat researchers and data scientists worldwide.

Latest News


Old Phantom Crypter upends malicious document tools

As the new year began, the makers of tools that generate the malicious documents used in social engineering spam attacks threw out the rule book and started fresh with an entirely new batch of Office exploits

Looking back on BlackHoodie, a women’s-only reverse engineering conference

Malware reverse-engineer Luca Nagy reflects on her experiences attending a unique technical conference

Matrix: Targeted, small-scale, canary in the coal mine ransomware

Two years on, Matrix is still like a rough first draft of a targeted ransomware, but that doesn't mean you can ignore it

DHCP, Edge, Office, Hyper-V Receive Critical New Year Updates

Just connecting to a (malicious) wireless network could lead to Bad Things Happening, but none of the patched bugs have been seen in the wild (yet!)

Microsoft’s December updates fix several dozen serious problems

Don't give your computers a year-end holiday from regular updates this month

Sophisticated Android clickfraud apps pose as iPhone apps and devices

A collection of Android apps exhibit novel and innovative advertising fraud capabilities

SophosLabs Overview

Data Science
  • Machine learning model development
  • Artificial intelligence research, thought leadership
Threat Intelligence
  • Rapid response to new threats and escalations
  • Deep research into threats and attack profiles
  • Automation of threat analysis and response
  • Quality assurance testing, analysis, and metrics