Beyond the kill chain: What cybercriminals do with their money (Part 5)
In the last of our five-part series, Sophos X-Ops explores the implications and opportunities arising from threat actors’ involvement in real-world industries and crimes
In the last of our five-part series, Sophos X-Ops explores the implications and opportunities arising from threat actors’ involvement in real-world industries and crimes
How to make the most of the new features in Sophos Firewall v21.5.
Five issues actively exploited in the wild, but the real excitement may have been handled in advance
CRN honors Sophos women whose channel expertise and vision are deserving of recognition.
Accelerating MSP business growth and elevating customers’ defenses with differentiated cybersecurity products and services.
The high-profile information stealer switches up its TTPs, but keeps the CAPTCHA tactic; we take a deep dive
The North Korean IT worker scheme grows to include organizations in Europe and Asia and industries beyond the technology sector
How to make the most of the new features in Sophos Firewall v21.5.
Multifaceted changes in TTPs illustrate what researchers see when they start digging