Uncategorized
Infostealers: The silent doorway to identity attacks — and why proactive defense matters
Credential theft isn’t just an inconvenience. It’s often the first move in a chain reaction that ends in full-scale compromise. Beyond the dreaded password reset process, information stealers, as shown in several recent cyberattacks, can have far more consequential follow-on effects. For many small and mid-sized organizations, a single stolen identity can lead to…
Sophos named a Leader in the KuppingerCole 2025 Leadership Compass for Email Security
A milestone that reflects our constant progress in email security.
Case Study: University of West England uses Sophos solutions to protect thousands of students across multiple campuses
As higher education institutions come under fire from threat actors, 24/7 vigilance is key
November Patch Tuesday does its chores
A cleanup month brings 63 patches… wait, no, 68… how about 61?
Defending the future: Our commitment to responsible AI in cybersecurity
Combining advanced technologies with human expertise to defend against evolving threats.
Sophos Firewall v22: Your top-requested features
Get involved in the Sophos Firewall v22 Early Access Program today!
Faster, safer, stronger: Sophos Firewall v22 security enhancements
Hardened kernel, remote integrity monitoring, an enhanced anti-malware engine, and more.
5 ways to strengthen your firewall and endpoint’s defenses against ransomware
Sophos Firewall uses intelligent TLS inspection and AI-powered analysts to reveal hidden threats — without compromising performance.
Detecting fraudulent North Korean hires: A CISO playbook
Has a North Korean threat actor applied for a position at your organization, or even been hired? We’re sharing a toolkit to help you detect and avoid that risk.
Phake phishing: Phundamental or pholly?
Debates over the effectiveness of phishing simulations are widespread. Sophos X-Ops looks at the arguments for and against – and our own phishing philosophy
