備有人工智慧的端點防護
全年無休,24 小時獵捕、偵測和回應威脅
The world’s most trusted cloud security platform
包括人工智慧以阻擋進階病毒,惡意軟體,漏洞利用和勒索軟體。
綜合平台助您增加營收
當地的 Sophos 合作夥伴。
If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty
127.0.0.1
An error has occurred, please try again later.
SophosLabs maintains lists of IP addresses suspected to be spam sources.
Submit An Appeal
IP Address Classification Policy
Share your questions, answers, advice and comments about threats in the Sophos Community.
In security we spend a lot of time trying to decipher the future. Where’s the next technology breakthrough? What are cybercriminals going to do next?
Annual threat reports provide an opportunity to look back at significant events of the past 12 months and identify trends for future development, action and protection. Looking back in time a little further helps to provide context for how we arrived at our current situation and why some things are the way they are. A long view of history can point to subtle changes or seismic shifts within an industry.
As much of the world shifted to remote work in 2020, cybercriminals upped their game, devising ways to use the fears and anxieties of organizations and end users against them.
Kingminer is an opportunistic botnet that keeps quiet and flies under the radar. The operators are ambitious and capable, but don’t have endless resources – they use any solution and concept that is freely available, getting inspiration from public domain tools as well as techniques used by APT groups.
The botnet known as MyKings wields a wide range of automated methods to break into servers – all just to install cryptocurrency miners.
An investigation into an attack against a cloud computing server reveals an unusual and innovative way for malware to communicate through Amazon’s firewalls
What defenders should know about the most prevalent and persistent malware families.
Network security threats explained: Social engineering
Petya Ransomware Attack: How to Protect Yourself
How WannaCry ransomware works
Comparing the incomparables Gábor Szappanos
Practical Shellcode Analysis Gábor Szappanos