Uncategorized
Incident responders, s’il vous plait: Invites lead to odd malware events
A phishing campaign targeting multiple organizations led to RMM installations – but not much else (yet). A threat actor experimenting, or an access-as-a-service attack underway? Categories: Threat Research Tags: STAC6405, infostealer, RMM, Phishing
Where AI in the SOC is actually delivering — and where it isn’t
“We’ll have a generation of security professionals who can supervise AI but can’t function without it.” Categories: AI Research, Sophos Insights Tags: AI, AI Cybersecurity, AI RESEARCH, Generative AI, SOC
Sophos Firewall ranked the #1 overall firewall solution in G2’s Spring 2026 reports
Why organizations are choosing Sophos Firewall to reduce exposure and strengthen resilience Categories: Products & Services, Products Tags: Firewall, G2, Awards
Cybersecurity for Education – Sophos Protected Classroom
Categories: Products & Services Tags: Education, Endpoint, NDR, MDR
High-Five: Sophos Ranked Number 1 Overall in Endpoint, EDR, XDR, MDR, and Firewall in the G2 Spring 2026 Reports
#1 ranked in 78 global reports Categories: Products & Services Tags: MDR, network, Endpoint, Firewall
Oracle vulnerability (CVE-2026-21992) impacts core products
Categories: Threat Research Tags: advisory, vulnerability, Oracle
The global CISO landscape: A leadership gap too large to ignore
Why the world needs scalable security leadership — and MSPs and MSSPs are key to delivery Categories: Products & Services Tags: Featured, CISO, Survey
NICKEL ALLEY strategy: Fake it ‘til you make it
Victimizing software developers via fake companies, jobs, and code repositories to steal cryptocurrency Categories: Threat Research Tags: NICKEL ALLEY, Contagious Interview, North Korea, clickfix
Android devices ship with firmware-level malware
Keenadu malware gives an attacker control over a device but appears to be used primarily to facilitate ad fraud Categories: Threat Research Tags: Android, Keenadu
March Patch Tuesday visits 15 product families
Eight Critical-severity bugs – none in Windows – appear in 84-CVE haul Categories: Threat Research Tags: Patch Tuesday, x-ops, Microsoft, Windows, detection
