Uncategorized
Laughter in the dark: Tales of absurdity from the cyber frontline and what they taught us
From a quintuple-encryption ransomware attack to zany dark web schemes and AI fails, Sophos X-Ops looks back at some of our favorite weirdest incidents from the last few years – and the serious lessons behind them Categories: Threat Research Tags: Ransomware, Hive, Lockbit, BlackCat, LLM, AI, Money Laundering
The State of Ransomware in Enterprise 2025
Categories: Products & Services Tags: Ransomware, Enterprise, Solutions, The State of Ransomware
Year in Review 2025: The major headlines and moments from Sophos this year
Categories: Sophos Insights Tags: Year in Review, security news
Human-in-the-loop security will define 2026: Predictions from Sophos experts
Categories: Sophos Insights Tags: Sophos, Year in Review
5 ways your firewall can keep ransomware out — and lock it down if it gets in
Categories: Sophos Insights Tags: Firewall, Ransomware
I am not a robot: ClickFix used to deploy StealC and Qilin
The fake human verification process led to infostealer and ransomware infections Categories: Threat Research Tags: clickfix, Featured, GOLD FEATHER, human verification, infostealer, qilin, Ransomware, StealC
Game of clones: Sophos and The MITRE ATT&CK Enterprise 2025 Evaluations
Winter is coming – so it must be time for Sophos X-Ops’ report on this year’s MITRE ATT&CK Enterprise Evaluations Categories: Threat Research Tags: ATT&CK, Emulation, Featured, MITRE, MUSTANG PANDA, scattered spider, Sophos X-Ops
React2Shell flaw (CVE-2025-55182) exploited for remote code execution
The availability of exploit code will likely lead to more widespread opportunistic attacks Tags: Threat Research, Featured, vulnerability, react2shell
A big finish to 2025 in December’s Patch Tuesday
A month with no Critical-severity Windows bugs is overshadowed by a mass of Mariner mop-up Categories: X-ops Tags: threat research, featured, Microsoft, Patch Tuesday, zero days
I am not a robot: ClickFix used to deploy StealC and Qilin
The fake human verification process led to infostealer and ransomware infections
