
Tor2Mine cryptominer has evolved: Just patching and cleaning the system won’t help
Sophos released new findings on the Tor2Mine cryptominer, that show how the miner evades detection, spreads automatically through a target network and is increasingly harder …

Top 10 ways attackers are increasing pressure on their ransomware victims to pay
Sophos researchers have detailed how ransomware attackers are implementing a wide range of ruthless pressure tactics to persuade victims to pay the ransom. Their research is …

DTEX Systems provides insider threat intelligence and investigation services with DTEX I3 research team
DTEX Systems launched DTEX Insider Intelligence and Investigations (DTEX I3), an expanded investigations and research division focused on delivering insider threat behavioral …

Researchers discover ransomware that encrypts virtual machines hosted on an ESXi hypervisor
Sophos has released details of a new ransomware written in Python that attackers used to compromise and encrypt virtual machines hosted on an ESXi hypervisor. The report …
Aqua Security appoints Christopher Smith as Chief Revenue Officer
Aqua Security appointed Christopher Smith as Chief Revenue Officer. With nearly 30 years of enterprise IT experience and 19 in cybersecurity, Smith will join the executive …

New infosec products of the week: August 13, 2021
Here’s a look at the most interesting product releases from the past week, featuring releases from NETGEAR, McAfee, Sectigo, Arcserve and Threat Stack. NETGEAR Armor offers …
Arcserve appliances protect critical IT infrastructure from data loss, downtime, and ransomware
Arcserve announced Arcserve N Series appliances, which deliver integrated hyperscale backup, recovery, and ransomware protection to enterprise infrastructures. The Arcserve N …

Consumers are increasingly concerned about online security and imminent attacks
According to a new Sophos Home survey, forty-five percent of consumers say they’re more at risk of being hit by an attack now than they were before the pandemic, and 61% …
Sophos acquires Braintrace to provide better security outcomes to their MDR customers
Sophos announced that it has acquired Braintrace, further enhancing Sophos’ Adaptive Cybersecurity Ecosystem with Braintrace’s proprietary Network Detection and Response (NDR) …

Sophos XDR: Threat hunting through the entire security ecosystem
Almost a decade ago, ransomware started becoming a prominent consumer problem, locking computers and threatening users with fines and jail time for supposedly downloading …
Security Compass names Rob Bentley as CRO
Security Compass announced the expansion of its executive leadership team. In addition to the internal advancement of multiple strategic leaders, Rob Bentley has been named …

Only 8% of businesses that paid a ransom got all of their data back
The average total cost of recovery from a ransomware attack has more than doubled in a year, increasing from $761,106 in 2020 to $1.85 million in 2021, a Sophos survey …
Featured news
Resources
Don't miss
- Mastering the cybersecurity tightrope of protection, detection, and response
- PRevent: Open-source tool to detect malicious code in pull requests
- Darcula allows tech-illiterate crooks to create, deploy DIY phishing kits targeting any brand
- Hackers pose as employers to steal crypto, login credentials
- Unknown and unsecured: The risks of poor asset visibility