Multiple attackers increase pressure on victims, complicate incident response
Sophos’ latest Active Adversary report explores the issue of organizations being hit multiple times by attackers
Sophos’ latest Active Adversary report explores the issue of organizations being hit multiple times by attackers
Has your PC been hacked? Whatever happens, don’t panic. Read on for ten signs your PC has been hacked and handy tips on how to fix it.
The post How to check if your PC has been hacked – and what to do next appeared first on WeLiveSecurity
To mark this occasion, Sophos’ Indigenous Peoples Network is sharing resources across our global team.
Six presentations in Las Vegas this week cover multiple cybersecurity applications of machine learning
Learn the basics of zero-trust, and how building a zero-trust environment can protect your organization.
The post Build a zero‑trust environment to protect your organization – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Four years on, Genesis Marketplace remains the go-to underground market for easy access to other people’s data
Are you on Tinder? With 75 million monthly active users, you might be able to find the right one. However there are also traps you need to look out for. Read more about catfishing, sextortion, phishing and other practices used by scammers.
The post Don’t get singed by scammers while you’re carrying the torch for Tinder appeared first on WeLiveSecurity
Reinforcing our commitment to address cybersecurity workforce challenges
Whether you are getting ready for back-to-school season, getting new work laptop or fancying a new gamer’s pc, learn the steps to protect your new PC from cyberthreats.
The post Start as you mean to go on: the top 10 steps to securing your new computer appeared first on WeLiveSecurity
Cybercriminals steal the equivalent of $18M from the NFT music streaming platform Audius, while other cyberthreats related to crypto made the news.
The post Music streaming platform victim of a crypto theft – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Sophos has been independently certified as one of the best employers in the country by Great Place to Work.
Learn to spot some of the threats that you can face while browsing online, and the best tips to stay safe on the web.
The post Staying safe online: How to browse the web securely appeared first on WeLiveSecurity
It pays to be careful – here’s how you can stay safe from fake giveaways, money flipping scams and other cons that fraudsters use to trick payment app users out of their hard-earned cash
The post Cash App fraud: 10 common scams to watch out for appeared first on WeLiveSecurity
Sophos’ new Cloud Native Security offering helps automate, simplify and enhance response to malicious files detected by the new Amazon service
Protect all your servers, from on-prem to multi-cloud, Windows to Linux, all fully integrated within Sophos Central.
Sophos Firewall OS v19 MR1 brings a number of additional enhancements and fixes to what is already one of our best firewall updates ever.
I’ve created an NFT so you don’t have to – here’s the good, the bad and the intangible of the hot-ticket tokens
The post NFT: A new‑fangled trend or also a new‑found treasure? appeared first on WeLiveSecurity
ESET research shows yet again that macOS is not immune to malware and why some users can benefit from Apple’s Lockdown Mode
The post macOS malware: myth vs. reality – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Trust is a dangerous word in IT, especially when that trust is granted without much consideration: when it’s implied, or when it’s never questioned. Creating a sealed-off perimeter where everything and everyone within the network is fully trusted has proven to be a flawed design. Yet, that’s how many networks are still implemented today. Anyone […]
Today, we released new Sophos research into a series of Microsoft SQL Server attacks. We also released a new piece outlining our vision of how security operations can and will be enhanced and improved by machine learning and artificial intelligence: “Building the AI-Driven SOC: Sophos’ 5-Year Perspective.” Finally, today we announced the launch of Sophos […]
Looking ahead to the Security Operation Center of the future, forged from developments in XDR, AI innovation, and programmable security posture and powered by the AI-UX value circuit
How do the pieces of Sophos X-Ops fit together? A combined effort makes tidy work of a threat actor’s big play
What exactly is Sophos X-Ops? Sophos X-Ops is a new, cross-operational (X-Ops) team linking SophosLabs, Sophos SecOps and Sophos AI, three established teams of cybersecurity experts at Sophos, to help organizations better defend against constantly changing and increasingly complex cyberattacks. The unit leverages the predictive, real-time, real-world, and deeply researched threat intelligence from each distinct
Listen to Cameron Camp, Juraj Jánošík, and Filip Mazán discuss the use of machine learning in cybersecurity, followed by Cameron’s insights into the security of medical devices
The post ESET Research Podcast: Hot security topics at RSA or mostly hype? appeared first on WeLiveSecurity
Previously unknown macOS malware uses cloud storage as its C&C channel and to exfiltrate documents, keystrokes, and screen captures from compromised Macs
The post I see what you did there: A look at the CloudMensis macOS spyware appeared first on WeLiveSecurity
Why downloading pirated video games may ultimately cost you dearly and how to stay safe while gaming online
The post Think twice before downloading pirated games – Week in security with Tony Anscombe appeared first on WeLiveSecurity
Sophos ZTNA has received Frost & Sullivan’s prestigious Global New Product Innovation Award in the zero trust network access industry.
Older hardware and outdated operating systems contribute to attacks
The heavyweights are now moving into API security, cementing it as “A Thing”
The post API security moves mainstream appeared first on WeLiveSecurity
Ngrok is a legitimate remote-access tool. It is regularly abused by attackers, who use its capabilities and reputation to maneuver while bypassing network protections. This incident guide shows Security Operations Centers (SOCs) and response teams how to detect and respond to the suspicious presence or use of ngrok on the network.
4909 Murphy Canyon Road Suite, 500
San Diego, CA 92123
Store
Company
Support
Newsletter
Technology Solutions You Can Trust Dismiss