Sophos UTM

Sophos SafeGuard Encryption

Sophos Naked Security

How BitPaymer ransomware covers its tracksThis BitPaymer malware variant uses tricks that you don't usually see in ransomware - but it st [...]

News in brief: Experian PIN fail; SEC hacked; AI vs terrorYour daily round-up of some of the other stories in the news [...]

Hackers hold entire school district to ransomThe hacking group stole personal information and sent explicit death threats against children to the [...]

“Admin from Hell” holds company to ransom with porn makeoverThe IT admin demanded $10,000, when he didn't get it things got X-rated [...]

Critical VMware vulnerability, patch and update nowThe impact of this critical vulnerability has the potential to be great. [...]

Threatpost News

APT33 targets petrochemical, aerospace and energy sector firms based in U.S., Saudi Arabia and South [...]

Joomla on Tuesday patched a critical LDAP injection vulnerability that had lingered in the content m [...]

Researchers combed through 2,000 Chrome error reports to better classify HTTPS error warnings. [...]

Proof-of-concept malware called aIR-Jumper can be used to bypass air-gapped network protections and [...]

A deep-learning network known as a GAN has been applied to passwords, and a tool called PassGAN sign [...]

Sophos Blog

Man vs machine: comparing artificial and biological neural networksBy comparing and contrasting biological learning to artificial intelligence, we can build a more sec [...]

Sophos Mobile: iOS 11 and Android Oreo ready, alreadySophos Mobile is ready to protect your iOS 11 and Android 8.0 users today [...]

Sophos XG Firewall v17 is nearly here – and we’d like your help to shape itThe highly anticipated public beta for Sophos XG Firewall v17 is now underway - be part of the testi [...]

The Sophos Central Enterprise Dashboard – everything you need at your fingertipsThe Sophos Central Dashboard lets you manage sub-estates and share licenses [...]

Defining the truth: how Sophos overcomes uncertain labels in machine learningUncertain labels are a challenge of applying machine learning to cybersecurity. We look at some of t [...]