Sophos UTM

Sophos SafeGuard Encryption

Sophos Naked Security

Did Facebook know about “View As” bug before 2018 breach?Even though Facebook protected employees, it failed to fix the vulnerability or to protect most user [...]

Multiple HTTP/2 DoS flaws found by NetflixNetflix has identified several denial of service (DoS) flaws in HTTP/2, a popular network protocol t [...]

61 impacted versions of Apache Struts left off security advisoriesResearchers found that 24 security advisories inaccurately listed affected versions for the open-sou [...]

Monday review – the hot 22 stories of the weekFrom Microsoft patches to Android malware on brand new phones, and everything in between. Catch up w [...]

iPhone holes and Android malware – how to keep your phone safeWatch the latest Naked Security Live video for our non-technical tips to improve your online safety, [...]

Threatpost News

It's been around forever, but in a modern digital era marked by influence campaigns and deep fa [...]

The number of exposed records has hit record highs in just the first two quarters. [...]

More than 300,000 users still utilize credentials that have been compromised - with people visiting [...]

From the biometrics of one million being exposed, to new Microsoft Bluekeep-like threats, Threatpost [...]

Eight vulnerabilities in the HTTP/2 server implementations were found in vendors Amazon, Apple, Micr [...]

Sophos Blog

Sophos wins multiple channel leadership awardsOur CEO Kris Hagerman and Senior Vice President Kendra Krause have been named one of CRN's Top [...]

Baldr vs The World: A SophosLabs reportA new stealer enjoys a wild ride, but is it a flash in the pan or a long term threat? [...]

Would you fall for a BEC attack?A county in North Carolina recently lost $1.7m in a Business Email Compromise scam, stay alert to th [...]

The security of machine learningArtificial intelligence and machine learning are persistently in the headlines with rich debate over [...]

3 reasons attackers love your servers37% of cyberattacks are discovered on servers, making them the most likely place to identify an atta [...]