Dev
Threat Research
virtual machine
cybercrime
Ransomware
ISPs
Malicious use of virtual machine infrastructure
二月 4, 2026
state-sponsored ransomware
victimization
Eeny, meeny, miny, moe? How ransomware operators choose victims
一月 28, 2026
Microsoft Office
vulnerability
advisory
Microsoft Office vulnerability (CVE-2026-21509) in active exploitation
一月 27, 2026
Respond to threats in the shortest time.
Simple search options and pre-canned query templates enable you to find the data you need faster, without needing to be an SQL expert.
Detections and cases are automatically mapped to MITRE ATT&CK Tactics, enabling you to easily identify gaps in your defenses.
Easily identify suspicious activity that needs immediate attention. Sophos automatically prioritizes detections based on risk, providing full context.
Automated actions like process termination, ransomware rollback, and network isolation contain threats rapidly and save you valuable time.
Automatic case creation enables rapid investigation, with comprehensive case management tools for collaboration.