Total Tech Blog

Thread Defense

Don’t get singed by scammers while you’re carrying the torch for Tinder 

Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.
The post Don’t get singed by scammers while you’re carrying the torch for Tinder  appeared first on WeLiveSecurity

Read More »
Thread Defense

Cash App fraud: 10 common scams to watch out for

It pays to be careful – here’s how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash
The post Cash App fraud: 10 common scams to watch out for appeared first on WeLiveSecurity

Read More »
Thread Defense

What is zero trust and why is ZTNA so important?

Trust is a dangerous word in IT, especially when that trust is granted without much consideration: when it’s implied, or when it’s never questioned. Creating a sealed-off perimeter where everything and everyone within the network is fully trusted has proven to be a flawed design. Yet, that’s how many networks are still implemented today. Anyone […]

Read More »
Thread Defense

Behind the Research: The Making of “OODA: X-Ops Takes on Burgeoning SQL Server Attacks”

Today, we released new Sophos research into a series of Microsoft SQL Server attacks. We also released a new piece outlining our vision of how security operations can and will be enhanced and improved by machine learning and artificial intelligence: “Building the AI-Driven SOC: Sophos’ 5-Year Perspective.” Finally, today we announced the launch of Sophos […]

Read More »
Thread Defense

Sophos X-Ops FAQ

What exactly is Sophos X-Ops?  Sophos X-Ops is a new, cross-operational (X-Ops) team linking SophosLabs, Sophos SecOps and Sophos AI, three established teams of cybersecurity experts at Sophos, to help organizations better defend against constantly changing and increasingly complex cyberattacks. The unit leverages the predictive, real-time, real-world, and deeply researched threat intelligence from each distinct

Read More »
Thread Defense

Rapid Response: The Ngrok Incident Guide

Ngrok is a legitimate remote-access tool. It is regularly abused by attackers, who use its capabilities and reputation to maneuver while bypassing network protections. This incident guide shows Security Operations Centers (SOCs) and response teams how to detect and respond to the suspicious presence or use of ngrok on the network.

Read More »