News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Welcome to the SOPHOS Partner Channel

Here you will find all articles, news and whitepapers published by SOPHOS sorted by date.

More than 100 million users in 150 countries trust in SOPHOS. We offer the best protection against complex IT threats and data loss. Our comprehensive security solutions are easy to deploy, use and manage. SOPHOS offers award-winning encryption solutions, security solutions for endpoints, networks, mobile devices, email and web.

Read more

SMEs in sight: cyber attacks on supply chains

Partnerships, services, customer relationships – no organization operates independently. Contracts, compliances and laws regulate cooperation, but what about security criteria? Cyber ​​attacks on supply chains particularly affect small and medium-sized companies, according to the latest threat report from Sophos. In the latest Sophos Threat Report: Cybercrime on Main Street, the security experts report that in 2023 the Sophos MDR team responded increasingly to cases in which companies were attacked via the so-called supply chain, i.e. the supply chain in business and in the IT infrastructure became. In several cases, the vulnerabilities lay in the remote monitoring and management software...

Read more

Why cybercriminals specifically target backups
Why cybercriminals specifically target backups AI - MS

There are two main ways to recover encrypted data after a ransomware attack: restoring from backups and paying the ransom. The attackers also know this and try to deprive companies of a solution by attacking backups. Two problems, same cause: Complete recovery of data after a ransom payment is highly uncertain, because in case of doubt you cannot rely on a promise from cybercriminals. And restoring the data from the backups doesn't work in many cases because the cybercriminals have often encrypted them in order to...

Read more

Dangerous misconception: “We have no IT vulnerabilities”

“We have taken good precautions and I believe that we are well protected.” This often-uttered sentence creates a false sense of security. Although many companies have invested in cybersecurity, they only find out in an emergency whether security resilience actually delivers what it promises in all areas. IT security vulnerability assessments and penetration tests are more important than ever. Studies like the current Sophos Threat Report show that, despite all efforts, there are still too many loopholes for cybercriminals. Almost 50 percent of all malware cases analyzed targeted small and medium-sized companies...

Read more

Report shows SMEs in the crosshairs

Data and identity theft are the biggest threats to small and medium-sized businesses – SMBs. According to the Sophos Threat Report 50, almost 2023 percent of all malware cases analyzed targeted this market segment in 2024. Cybercrime is a challenge for organizations of all sizes, but small businesses are hit hardest and often under the public's radar. Sophos introduces its new Threat Report: Cybercrime on Main Street. This year the focus is on the biggest threats to small and medium-sized businesses (SMEs). Report: SMEs most threatened…

Read more

The Terminator tool is coming back
SophosNews

BYOVD (Bring Your Own Vulnerable Driver) are still very popular among threat actors as EDR killers. One reason is that this raises the prospect of a kernel-level attack, which gives cybercriminals a wide range of options - from hiding malware to spying on login credentials to attempting to disable EDR solutions. Sophos security specialists Andreas Klopsch and Matt Wixey have closely examined what has been happening with Terminator tools over the last six months and published the report “It'll be back: Attackers still abusing Terminator...

Read more

Qakbot remains dangerous
B2B Cyber ​​Security ShortNews

Sophos X-Ops has discovered and analyzed a new variant of the Qakbot malware. These cases first emerged in mid-December and show that the Qakbot malware has continued to evolve despite law enforcement's successful dismantling of the botnet infrastructure last August. The attackers use even better methods to cover their tracks. The cases analyzed by Sophos X-Ops show that cybercriminals made concerted efforts to strengthen the malware's encryption. This has made it more difficult for defenders to analyze the malicious code. In addition, the attackers are now encrypting the…

Read more

LockBit is alive
B2B Cyber ​​Security ShortNews

A few days ago, international law enforcement authorities scored a decisive blow against Lockbit. However, according to a comment from Chester Wisniewski, Director, Global Field CTO at Sophos, some of their infrastructure is still online, which likely indicates that some of the Lockbit cybercriminal group have not yet been caught. The chance of them joining other groups or forming a new group would not be a surprise. Sophos X-Ops is now publishing a report about the recently known security vulnerability in the remote management and monitoring solution ScreenConnect. The detailed analysis also provides a…

Read more

Pig Butchering: Lucrative business model for cyber gangs
Lucrative business model for cyber gangs

Sophos has uncovered how Sha Zhu Pan scammers are now using a business model similar to “cybercrime-as-a-service” for their supposedly romance-oriented so-called pig-butchering scams. The fraudsters sell Sha-Zhu-Pan kits on the Dark Web all over the world and are expanding into new markets. Sophos describes these operations (also known as pig booking) in the article “Cryptocurrency Scams Metastasize into New Forms.” The new sets come from organized crime gangs in China and provide the technical components needed to implement a special pig-butchering program called “DeFi savings”. The criminals pose…

Read more

Do companies even get cyber insurance?
Do companies even get cyber insurance? - KI MS

Cyber ​​insurance is not just a question of company strategy, but also whether you get it at all. The new Sophos guide to cyber insurance helps management and IT managers in companies better understand the cyber insurance market. After all, there are unavoidable requirements that must be met in order to ensure that insurance is as economical as possible. Companies often secure additional technical security through cyber insurance. Behind this strategy is, on the one hand, the knowledge of the danger of possibly backward in-house security and, on the other hand, a business calculation on the part of the management team. Every second company affected by attacks Sure…

Read more

Threat situation requires cybersecurity outsourcing

Cybersecurity – times are getting tougher: More than half of the companies surveyed (53 percent) expect a significant increase in cyber threats in the future. 43 percent, on the other hand, believe that the current level of cyber attacks will remain constant. This was the result of an interesting survey as part of a Cybersecurity as a Service study by Sophos. A so-called security operations center (SOC) is a crucial element of a modern, proactive security strategy. It focuses on the detection, analysis and response of security incidents in order to minimize the corresponding risks and to optimally protect data and business-critical processes in companies...

Read more