Uncategorized
From Security Operations to Security Leadership: Sophos CISO Advantage
Categories: Products & Services, Security Operations
Malicious use of virtual machine infrastructure
Bulletproof hosting providers are abusing the legitimate ISPsystem infrastructure to supply virtual machines to cybercriminals Categories: Threat Research Tags: virtual machine, cybercrime, Ransomware, ISPs
Sophos Protected Browser Early Access and FAQ
Categories: Products & Services Tags: Workspace
High Five: Sophos Named a 2026 Gartner® Peer Insights™ Customers’ Choice for Endpoint Protection Platforms
This marks the fifth consecutive time with a Customers’ Choice recognition for Sophos in the Endpoint Protection Platforms category. Categories: Products Tags: Gartner, Sophos Endpoint, XDR, Third-Party Reviews
Eeny, meeny, miny, moe? How ransomware operators choose victims
Most ransomware attacks are opportunistic, not targeted at a specific sector or region Categories: Threat Research Tags: Ransomware, cybercrime, state-sponsored ransomware, victimization
Microsoft Office vulnerability (CVE-2026-21509) in active exploitation
Categories: Threat Research Tags: Microsoft Office, vulnerability, advisory
Generative AI and cybersecurity: What Sophos experts expect in 2026
Categories: Sophos Insights Tags: Sophos AI, Gen AI, Year in Review
Beyond MFA: Building true resilience against identity-based attacks
Categories: Sophos Insights Tags: Identity Security, MFA, Sophos ITDR
Grupo NGO gains 24/7 security visibility without expanding its IT team
Tags: Case Study, MDR, Retail
Microsoft stacks up 113 CVEs for January Patch Tuesday
Categories: X-ops Tags: Patch Tuesday, Microsoft, Windows
