Uncategorized

Beyond the kill chain: What cybercriminals do with their money (Part 4)

In the fourth of our five-part series, Sophos X-Ops explores threat actors’ real-world criminal business interests

3 weeks ago

Beyond the kill chain: What cybercriminals do with their money (Part 3)

In the third of our five-part series, Sophos X-Ops explores the more legally and ethically dubious business interests of financially…

3 weeks ago

Beyond the kill chain: What cybercriminals do with their money (Part 2)

In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors

3 weeks ago

Beyond the kill chain: What cybercriminals do with their money (Part 1)

Sophos X-Ops investigates what financially motivated threat actors invest their ill-gotten profits in, once the dust has settled

3 weeks ago

Sophos Firewall v21.5: DNS protection

How to make the most of the new features in Sophos Firewall v21.5.

3 weeks ago

Microsoft primes 71 fixes for May Patch Tuesday

Five issues actively exploited in the wild, but the real excitement may have been handled in advance

3 weeks ago

Nineteen Sophos Women Recognized by CRN’s Women of the Channel

CRN honors Sophos women whose channel expertise and vision are deserving of recognition.

3 weeks ago

Introducing the Sophos MSP Elevate program

Accelerating MSP business growth and elevating customers' defenses with differentiated cybersecurity products and services.

3 weeks ago

Lumma Stealer, coming and going

The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive

3 weeks ago

Putting the dampener on tamperers

Taking a dive into Sophos Tamper Protection

4 weeks ago