Uncategorized
Android devices ship with firmware-level malware
Keenadu malware gives an attacker control over a device but appears to be used primarily to facilitate ad fraud Categories: Threat Research Tags: Android, Keenadu
March Patch Tuesday visits 15 product families
Eight Critical-severity bugs – none in Windows – appear in 84-CVE haul Categories: Threat Research Tags: Patch Tuesday, x-ops, Microsoft, Windows, detection
Initial access techniques used by Iran-based threat actors
Analysis of attacks originating from Iran-linked threat groups reveals a preference for certain techniques Categories: Threat Research Tags: Iran, initial access
Evil evolution: ClickFix and macOS infostealers
Across three recent campaigns, Sophos X-Ops notes shifts in both lures and malware capabilities, as threat actors leveraging ClickFix techniques increasingly target macOS users with infostealers Categories: Threat Research Tags: MacOS, infostealer, clickfix, MacSync, Social engineering
Optimize Your Sophos Firewall Security
Upgrade to Sophos Firewall v22 today. Categories: Products & Services Tags: Firewall, v22, network
Hacktivist campaigns increase as United States, Iran, and Israel conflict intensifies
Rising tensions have sparked an increase in regional hacktivist activity, but impact has been minimal Categories: Threat Research Tags: hacktivism, Iran, israel, Operation Epic Fury
Cyber Advisory: Increased Cyber Risk Amid U.S.–Israel–Iran Escalation
Insights and recommended defensive measures from Sophos X-Ops Counter Threat Unit Categories: Security Operations Tags: Sophos CTU, Iran, Operation Epic Fury
Cisco SD-WAN vulnerabilities (CVE-2026-20127, CVE-2022-20775) in active exploitation
Categories: Threat Research Tags: advisory, vulnerability, SD-WAN
Sophos Workspace Protection is Now Available
We’re excited to announce the highly anticipated release of Sophos Workspace Protection has arrived. Categories: Products & Services Tags: Workspace
Stopping real-world attacks: Lessons for business leaders from the 2026 cyber frontline
Practical steps to reduce business cyber risk based on analysis of 661 incidents remediated by Sophos X-Ops as detailed in the Sophos Active Adversary Report 2026 Categories: Products & Services Tags: MDR., Identity Security, ITDR, Secure by Design, XDR
