5 Cyber Criminal Ransomware Mistakes to Make You Smile
BrandPost Sophos

5 Cyber Criminal Ransomware Mistakes to Make You Smile

Even the criminals who attempt to lock up files in a ransomware attack make mistakes. Here’s how their missteps came back to bite them.

You’ve Been Hit by Ransomware. Now What?
BrandPost Sophos

You’ve Been Hit by Ransomware. Now What?

No organization wants to be in the crosshairs of a ransomware attack. But if it happens, here is how to get started with recovery.

3 Measures to Stifle the Ransomware Crisis
BrandPost Sophos

3 Measures to Stifle the Ransomware Crisis

We need a global reaction and strong partnerships to stop ransomware from hitting businesses in 2022.

Raccoon Stealer Campaign Highlights Robust Industrialized Criminal Market
BrandPost Sophos

Raccoon Stealer Campaign Highlights Robust Industrialized Criminal Market

This flavor of malware makes it easy for cyber thieves to set up business.

 New Dirty Tricks and the Latest Insights on Phishing
BrandPost Sophos

New Dirty Tricks and the Latest Insights on Phishing

A new Sophos report on phishing examines what IT teams are dealing with today in user inboxes.

Consumers Have a False Sense of Confidence Around Personal Security
BrandPost Sophos

Consumers Have a False Sense of Confidence Around Personal Security

A new Sophos report finds home computer users know they are at risk but are unclear on how to protect themselves.

BlackMatter Ransomware Quickly Fills Void Left by Darkside, REvil
BrandPost Sophos

BlackMatter Ransomware Quickly Fills Void Left by Darkside, REvil

Stay protected by keeping on top of endpoint protection alerts, which can indicate an imminent attack.

Are Retailers Ready for Holiday Season Ransomware?
BrandPost Sophos

Are Retailers Ready for Holiday Season Ransomware?

Ransomware attacks have hit all sectors, but retail is a favorite target of criminals. What do retailers need to do to ensure the holiday shopping season is not disrupted?

Clearing Up Confusion on Supply Chain Attacks
BrandPost Sophos

Clearing Up Confusion on Supply Chain Attacks

Supply chain and third-party connections are a necessary part of running IT today, but these also introduce risks to an organization. What can security leaders do to mitigate the risk of supply chain attacks?

New Threats Based on ProxyShell Vulnerability Require Immediate Action
BrandPost Sophos

New Threats Based on ProxyShell Vulnerability Require Immediate Action

Organizations with on-premises Exchange Server should update and patch servers as soon as possible to protect against threats posed by ProxyShell.

Security Threat Researchers Uncover “Dropper-as-a-Service Platforms”
BrandPost Sophos

Security Threat Researchers Uncover “Dropper-as-a-Service Platforms”

Malware-as-a-service platforms make it easy for would-be cybercriminals to cause trouble. Here’s how to protect yourself.

Novel Encryption Technique Helps Lockfile Ransomware Hide in Plain Sight
BrandPost Sophos

Novel Encryption Technique Helps Lockfile Ransomware Hide in Plain Sight

But prevention advice is not new: enterprises need a multilayered approach for protection.

Using TLS to Avoid Detection is On the Rise
BrandPost Sophos

Using TLS to Avoid Detection is On the Rise

Hiding in encrypted traffic is the newest way to breach a network and do damage. Here’s how security leaders can guard against this tricky tactic.

Combine XDR with Human Threat Hunters to Help Halt Cyber Attacks
BrandPost Sophos

Combine XDR with Human Threat Hunters to Help Halt Cyber Attacks

Stealthy hackers use common IT tools to pull off exploits and move around in networks. XDR, combined with skilled human threat detection, recently helped thwart a potentially damaging attack.

What’s Your Plan if Ransomware Hits?
BrandPost Sophos

What’s Your Plan if Ransomware Hits?

Trained staff and a modern tool set can help security teams move beyond mere prevention and into proactive detection.

Simply Protecting Yourself is No Longer Enough
BrandPost Sophos

Simply Protecting Yourself is No Longer Enough

Today’s security strategy requires getting proactive and searching for threats before they find you

Changing the Narrative Around Attack Victim Shaming
BrandPost Sophos

Changing the Narrative Around Attack Victim Shaming

Making end users feel bad about falling for social engineering attacks is not a productive way to shore up defenses.

Don’t Make Haste! The Downside of Rushing Attribution
BrandPost Sophos

Don’t Make Haste! The Downside of Rushing Attribution

Collecting the wrong indicators of compromise (IOCs) can actually do more harm than good.

How Criminals Abuse Common Security Tools – and Use Them Against You
BrandPost Sophos

How Criminals Abuse Common Security Tools – and Use Them Against You

By utilizing legitimate programs and tools, criminals can hide in plain sight on the network, causing significant damage

Mitigating Security Threats on Nontraditional Platforms
BrandPost Sophos

Mitigating Security Threats on Nontraditional Platforms

Just because it doesn’t look like a computer, doesn’t mean it can’t be exploited. Here’s how to guard against attacks on nontraditional devices

Load More
Top Blog Posts