Say goodbye to MX records with Sophos Email
Enjoy faster flowing, safer email with Sophos
Enjoy faster flowing, safer email with Sophos
Press play to hear Aryeh Goretsky, Jean-Ian Boutin and Robert Lipovsky discuss how recent malware attacks in Ukraine tie into years of cyberattacks against the country
The post ESET Research Podcast: Ukraine’s past and present cyberwar appeared first on WeLiveSecurity
Clearly define the job you want then go after it
ESET researchers uncover a new wiper that attacks Ukrainian organizations and a worm component that spreads HermeticWiper in local networks
The post IsaacWiper and HermeticWizard: New wiper and worm targeting Ukraine appeared first on WeLiveSecurity
As the conflict in Ukraine heightens the risk of cyberattacks globally, what can organizations do to improve their resiliency?
The post #ShieldsUp – Now is the time to double‑check cybersecurity processes and operations appeared first on WeLiveSecurity
An unpatched Microsoft Exchange Server let both ransomware actors in; Karma just stole data, while Conti encrypted.
Looking to help people in Ukraine? Donate wisely – do your research first so you give without getting scammed
The post Beware of charity scams exploiting war in Ukraine appeared first on WeLiveSecurity
HermeticWiper takes aim at Ukraine – The climate solutions we need to transform society – Preventing kids from getting involved in cybercrime
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
The current Russia-Ukraine crisis is unprecedented. One aspect of the current crisis is the very real concern around increased cyberattacks on an unprecedented scale. The concern is reasonable: there’s simply no way to know what’s going to happen next. And the concern stems not just from nation-state actors and their proxies: cybercriminals, hacktivists, and vandals
What can social movements of the past teach you about the future – and about protecting your digital self?
The post The past is present: Riffing on a cybersecurityappropriate tune for Black History Month appeared first on WeLiveSecurity
Hundreds of computers in Ukraine compromised just hours after a wave of DDoS attacks brings down a number of Ukrainian websites
The post HermeticWiper: New data‑wiping malware hits Ukraine appeared first on WeLiveSecurity
Tips to help you investigate incidents from experienced security analysts
Prevention includes reducing your attack surface and preventing attacks from running
Some code used in the ransomware bear a resemblance to code used in Dridex malware, hinting at a common origin
The climate solutions we need to transform every sector are here. The question is: what role will you play in this transformation? You, your community, your business, your government?
The post Technology, Progress, and Climate appeared first on WeLiveSecurity
EDITOR’S NOTE: This is an ongoing, live report and will be updated continuously with new information as it becomes available. The report was originally published on February 22, 2022 and was most recently updated on March 7, 2022
Sophos ZTNA provides a number of advantages over remote-access VPN – enabling remote workers to access the applications they need with much stronger security, all while making management a lot easier and providing a smoother end-user experience. Better security Sophos ZTNA provides better security for four reasons: Sophos ZTNA removes the need for vulnerable old
It’s never too late to prevent children from being dragged to the dark side and to ensure their skills are a force for good
The post Teenage cybercrime: How to stop kids from taking the wrong path appeared first on WeLiveSecurity
The working landscape has changed, almost beyond recognition. Working remotely is now commonplace, and data commonly resides in the public cloud and within software-as-a-service applications. The traditional perimeter security model is obsolete and it’s time for a change. Enter zero-trust network access as a new cybersecurity philosophy that removes implied trust and instead allows only
Make no mistake, counting on a computer is not as easy as it may seem. Here’s what happens when a number gets “too big”.
The post Integer overflow: How does it occur and how can it be prevented? appeared first on WeLiveSecurity
What does progress in technology mean? – IRS makes a U-turn on facial recognition but questions remain – What retailers need to know about cyberthreats
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
What does progress in technology mean? – IRS makes a U-turn on facial recognition but questions remain – What retailers need to know about cyberthreats
The post Week in security with Tony Anscombe appeared first on WeLiveSecurity
Sophos is committed to providing a work environment where all employees have the freedom to be themselves. To mark National Coming Out Day across Sophos, our LGBTQ+ Employee Resource Group has created some online resources to help inform employees about the history of the day and to provide guidance and support for coming out in
Progress is a driving force of humanity, but what does that word “progress” really mean and what part do we have to play?
The post Folding the impossible into the reality of normal life appeared first on WeLiveSecurity
Progress is a driving force of humanity, but what does that word “progress” really mean and what part do we have to play?
The post Folding the impossible into the reality of normal life appeared first on WeLiveSecurity
While Squirrelwaffle leveraged Exchange to spread malspam through hijacked email threads, one thread was spirited away by attackers to trick the target into a money transfer
Squirrelwaffle is a malicious dropper or loader used to deliver other malware onto target systems. This guide shows Security Operations Centers (SOCs) and Incident Response Teams how to detect and respond to the presence of Squirrelwaffle on the network
4909 Murphy Canyon Road Suite, 500
San Diego, CA 92123
Store
Company
Support
Newsletter
Technology Solutions You Can Trust Dismiss