Uncategorized
WhatsApp compromise leads to Astaroth deployment
Another campaign targeting WhatsApp users in Brazil spreads like a worm and employs multiple payloads for credential theft, session hijacking, and persistence
Securing your network for the holidays
Tips to better protect your network over extended breaks.
Advancing Cybersecurity for Microsoft Environments
From certified MDR services to open threat intelligence frameworks, Sophos is delivering the clarity, context, and confidence organizations need to stay ahead of evolving threats.
From point-in-time audits to continuous confidence: How Sophos IT transformed identity defense
“From logging in and connecting to Entra ID to seeing our first actionable findings — it took less than 45 minutes.”
Infostealers: The silent doorway to identity attacks — and why proactive defense matters
Credential theft isn’t just an inconvenience. It’s often the first move in a chain reaction that ends in full-scale compromise. Beyond the dreaded password reset process, information stealers, as shown in several recent cyberattacks, can have far more consequential follow-on effects. For many small and mid-sized organizations, a single stolen identity can lead to…
Sophos named a Leader in the KuppingerCole 2025 Leadership Compass for Email Security
A milestone that reflects our constant progress in email security.
Case Study: University of West England uses Sophos solutions to protect thousands of students across multiple campuses
As higher education institutions come under fire from threat actors, 24/7 vigilance is key
November Patch Tuesday does its chores
A cleanup month brings 63 patches… wait, no, 68… how about 61?
Defending the future: Our commitment to responsible AI in cybersecurity
Combining advanced technologies with human expertise to defend against evolving threats.
Sophos Firewall v22: Your top-requested features
Get involved in the Sophos Firewall v22 Early Access Program today!
