
BrandPost Sponsored by Sophos
5 Cyber Criminal Ransomware Mistakes to Make You Smile
Even the criminals who attempt to lock up files in a ransomware attack make mistakes. Here’s how their missteps came back to bite them.

BrandPost Sponsored by Sophos
You’ve Been Hit by Ransomware. Now What?
No organization wants to be in the crosshairs of a ransomware attack. But if it happens, here is how to get started with recovery.

BrandPost Sponsored by Sophos
3 Measures to Stifle the Ransomware Crisis
We need a global reaction and strong partnerships to stop ransomware from hitting businesses in 2022.

BrandPost Sponsored by Sophos
Raccoon Stealer Campaign Highlights Robust Industrialized Criminal Market
This flavor of malware makes it easy for cyber thieves to set up business.

BrandPost Sponsored by Sophos
New Dirty Tricks and the Latest Insights on Phishing
A new Sophos report on phishing examines what IT teams are dealing with today in user inboxes.

BrandPost Sponsored by Sophos
Consumers Have a False Sense of Confidence Around Personal Security
A new Sophos report finds home computer users know they are at risk but are unclear on how to protect themselves.

BrandPost Sponsored by Sophos
BlackMatter Ransomware Quickly Fills Void Left by Darkside, REvil
Stay protected by keeping on top of endpoint protection alerts, which can indicate an imminent attack.

BrandPost Sponsored by Sophos
Are Retailers Ready for Holiday Season Ransomware?
Ransomware attacks have hit all sectors, but retail is a favorite target of criminals. What do retailers need to do to ensure the holiday shopping season is not disrupted?

BrandPost Sponsored by Sophos
Clearing Up Confusion on Supply Chain Attacks
Supply chain and third-party connections are a necessary part of running IT today, but these also introduce risks to an organization. What can security leaders do to mitigate the risk of supply chain attacks?

BrandPost Sponsored by Sophos
New Threats Based on ProxyShell Vulnerability Require Immediate Action
Organizations with on-premises Exchange Server should update and patch servers as soon as possible to protect against threats posed by ProxyShell.

BrandPost Sponsored by Sophos
Security Threat Researchers Uncover “Dropper-as-a-Service Platforms”
Malware-as-a-service platforms make it easy for would-be cybercriminals to cause trouble. Here’s how to protect yourself.

BrandPost Sponsored by Sophos
Novel Encryption Technique Helps Lockfile Ransomware Hide in Plain Sight
But prevention advice is not new: enterprises need a multilayered approach for protection.

BrandPost Sponsored by Sophos
Using TLS to Avoid Detection is On the Rise
Hiding in encrypted traffic is the newest way to breach a network and do damage. Here’s how security leaders can guard against this tricky tactic.

BrandPost Sponsored by Sophos
Combine XDR with Human Threat Hunters to Help Halt Cyber Attacks
Stealthy hackers use common IT tools to pull off exploits and move around in networks. XDR, combined with skilled human threat detection, recently helped thwart a potentially damaging attack.

BrandPost Sponsored by Sophos
What’s Your Plan if Ransomware Hits?
Trained staff and a modern tool set can help security teams move beyond mere prevention and into proactive detection.

BrandPost Sponsored by Sophos
Simply Protecting Yourself is No Longer Enough
Today’s security strategy requires getting proactive and searching for threats before they find you

BrandPost Sponsored by Sophos
Changing the Narrative Around Attack Victim Shaming
Making end users feel bad about falling for social engineering attacks is not a productive way to shore up defenses.

BrandPost Sponsored by Sophos
Don’t Make Haste! The Downside of Rushing Attribution
Collecting the wrong indicators of compromise (IOCs) can actually do more harm than good.

BrandPost Sponsored by Sophos
How Criminals Abuse Common Security Tools – and Use Them Against You
By utilizing legitimate programs and tools, criminals can hide in plain sight on the network, causing significant damage

BrandPost Sponsored by Sophos
Mitigating Security Threats on Nontraditional Platforms
Just because it doesn’t look like a computer, doesn’t mean it can’t be exploited. Here’s how to guard against attacks on nontraditional devices