Build a prevention-first defense: The Sophos Cybersecurity Toolkit
Explore the Cybersecurity toolkit and start building your prevention-first strategy today.
Explore the Cybersecurity toolkit and start building your prevention-first strategy today.
The power grid is being attacked online and IRL. Increasingly, regulators and industry experts agree: Security teams need to focus on both cyber and physical threats, together.
The US government is throwing the book at even mid-level cybercriminals. Is it just, and is it working?
CVE-2025-31324 is a maximum severity bug that attackers exploited weeks before SAP released a patch for it.
The security vulnerability tracked as CVE-2024-50603, which rates 10 out of 10 on the CVSS scale, enables unauthenticated remote code execution on affected systems, which cyberattackers are using to plant malware.
Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified as behind over a dozen technology patents, shedding light on the shadowy cyber contracting ecosystem and its offensive capabilities. The patents cover forensics and intrusion tools that enable encrypted endpoint data collection, Apple device forensics, and remote access…
A malware campaign distributing the XLoader malware has been observed using the DLL side-loading technique by making use of a legitimate application associated with the Eclipse Foundation. “The legitimate application used in the attack, jarsigner, is a file created during the installation of the IDE package distributed by the Eclipse Foundation,” the AhnLab SEcurity Intelligence…