Attackers are exploiting recently patched RCE in Sophos Firewall (CVE-2022-1040)
A critical vulnerability (CVE-2022-1040) in Sophos Firewall is being exploited in the wild to target “a small set of specific organizations primarily in the South Asia …
Sophos appoints Rob Lalumondier as VP of Federal Business
Sophos announced the appointment of Rob Lalumondier as vice president of its federal business. Lalumondier will leverage his extensive cybersecurity federal sales experience …
Cyber attacks on Ukraine: DDoS, new data wiper, cloned websites, and Cyclops Blink
This Thursday morning, Russia started its invasion on Ukraine and, as predicted, the attacks in the physical world have been preceded and accompanied by cyber attacks: Renewed …
Attackers used Dridex to deliver Entropy ransomware, code resemblance uncovered
Sophos released a research that details code similarities in the general purpose Dridex botnet and the little-known ransomware, Entropy. The similarities are in the software …
PCI SSC and the National Cybersecurity Alliance issue bulletin to highlight ransomware threat
The PCI Security Standards Council (PCI SSC) and the National Cybersecurity Alliance issued a joint bulletin on the increasing threat of ransomware attacks. What is the …
Attackers bypass Microsoft patch to deliver Formbook malware
Sophos Labs researchers have detected the use of a novel exploit able to bypass a patch for a critical vulnerability (CVE-2021-40444) affecting the Microsoft Office file …
Log4Shell: A new fix, details of active attacks, and risk mitigation recommendations
Due to the extraordinary widespread use of the open-source Apache Log4j library, the saga of the Log4Shell (CVE-2021-44228) vulnerability is nowhere near finished. As Dr. …
Tor2Mine cryptominer has evolved: Just patching and cleaning the system won’t help
Sophos released new findings on the Tor2Mine cryptominer, that show how the miner evades detection, spreads automatically through a target network and is increasingly harder …
Top 10 ways attackers are increasing pressure on their ransomware victims to pay
Sophos researchers have detailed how ransomware attackers are implementing a wide range of ruthless pressure tactics to persuade victims to pay the ransom. Their research is …
DTEX Systems provides insider threat intelligence and investigation services with DTEX I3 research team
DTEX Systems launched DTEX Insider Intelligence and Investigations (DTEX I3), an expanded investigations and research division focused on delivering insider threat behavioral …
Researchers discover ransomware that encrypts virtual machines hosted on an ESXi hypervisor
Sophos has released details of a new ransomware written in Python that attackers used to compromise and encrypt virtual machines hosted on an ESXi hypervisor. The report …
Aqua Security appoints Christopher Smith as Chief Revenue Officer
Aqua Security appointed Christopher Smith as Chief Revenue Officer. With nearly 30 years of enterprise IT experience and 19 in cybersecurity, Smith will join the executive …