News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Research: REvil ransomware investigated
SophosNews

REvil, also known as Sodinokibi, is a mature and widespread ransomware-as-a-service (RaaS) offering. Sophos researchers examined the tools and behaviors that attackers believe are most common in deploying a REvil attack. Criminal customers can lease the ransomware from the developers and place it on their victims' computers with their own parameters. The respective approach and the effects of an attack with REvil ransomware are therefore very variable and depend on the tools, behaviors, resources and skills of the attacker who is renting the malware. REvil ransomware under the hood Andrew Brandt, ...

Read more

The 10 biggest misconceptions about cyberattacks
The 10 biggest misconceptions about cyberattacks

Big or small, security flaws crop up in almost every company and organization that calls on the Sophos Rapid Response Team for help. The experts have summarized and evaluated the ten most common wrong arguments on the front lines against cyber attacks in the past year. “We're way too small! Our endpoint protection also keeps attackers away from the server! Our backups are safe from ransomware! ”- The Sophos Rapid Response team repeatedly encounters misjudgments in its fight against cyberattacks. Here is the list with the top 10. Mistake 1:…

Read more

Cyber ​​gangsters on average 11 days undetected in networks
Cyber ​​gangsters on average 11 days undetected in networks

New Sophos Incident Response Almanac: Cyber ​​gangsters stay undetected in networks for an average of 11 days. Sophos publishes new "Active Adversary Playbook 2021" with telemetry data from its MTR and Rapid Response team: Hackers used more than 400 different tools and techniques, 81 percent of the incidents involved ransomware and 69 percent of the attacks involved remote Desktop Protocol (RDP) used for crawling. Sophos has published its “Active Adversary Playbook 2021”. It describes the attackers' behavior, tools, techniques, and procedures (TTPs) as Sophos threat hunters and analysts monitor them from 2020 through spring 2021 ...

Read more

New XDR solution from Sophos
SophosXDR

New XDR solution from Sophos synchronizes endpoint, server, firewall and email security. Sophos XDR extends next generation security solutions with new EDR functions and thus creates a comprehensive and integrated threat detection and response system. Today Sophos introduces its new solution, Sophos XDR. It is the only Extended Detection and Response (XDR) solution in the industry that synchronizes endpoint, server, firewall and email security. With this comprehensive and integrated approach, Sophos XDR offers a holistic overview of a company's security environment, combined with a comprehensive data set and in-depth analysis options for the detection and investigation of ...

Read more

Ransomware: Horrifying costs, complex, hardly any data return
Ransomware: Horrifying costs, complex, hardly any data return

The Sophos report "The State-of-Ransomware 2021" shows what happens in companies when ransomware attacks occur: Horrific costs, too complex and hardly any data is returned. Ransomware restoration costs an average of around 970.000 euros in Germany - far more than twice as much as in 2020. Sophos announces the results of its global study "The State of Ransomware 2021". Particularly striking: the international average costs for recovery after a ransomware attack have more than doubled in one year, specifically from around 630.000 euros in 2020 (Germany 390.000 euros) to 1,53 million euros in 2021 (Germany 970.000 euros)….

Read more

Sophos new XGS firewall range
Sophos new XGS firewall range

Sophos introduces the new XGS firewall series with Xstream flow processors and TLS inspection. The latest study shows that more and more cyber criminals are using the Transport Layer Security (TLS) encryption protocol for attacks. Sophos introduces its new firewall models of the XGS series. Completely redeveloped, the platform is characterized by its very high performance and advanced protection against cyber attacks. In addition to great flexibility, the new models with dedicated Xstream Flow processors enable extremely powerful TLS (Transport Layer Security) inspections - including native support for TLS 1.3, which is up to five times faster than others on ...

Read more

Incident response put to the test
Incident response put to the test

Companies and organizations are under enormous pressure in the event of a cyber attack, because the correct reaction to an incident is time-consuming, but at the same time requires quick action. The incident response experts at Sophos have therefore developed a guide to help companies cope with this difficult task. These four tips are based on the hands-on experience of the Managed Threat Response and Rapid Response teams who have collectively responded to thousands of cyber security incidents. 1. React as quickly as possible When a company is attacked, every second counts. In-house security teams often need to ...

Read more

Attackers use Exchange vulnerability for crypto miners
SophosNews

Sophos Labs has identified an attacker using an Exchange vulnerability for cryptomining: “Admins should scan the Exchange server for web shells and monitor servers for unusual processes that appear to appear out of nowhere. High processor usage by an unknown program could be a sign of crypto mining activity or ransomware,” said Andrew Brandt, Principal Threat Researcher at Sophos. The well-known, recent problems relating to the Microsoft Exchange Server vulnerabilities are far from over: Even after the security patches of March 2nd and 9th, new attackers are still using the exploit for their attacks...

Read more

Container scanning in cloud environments 
Container scanning in cloud environments

More security in cloud environments through container scanning. Sophos Cloud Optix now also identifies weaknesses in container images and enables automated reactions. Sophos is expanding its cloud analysis solution, Sophos Cloud Optix, and offers additional security for container assets in multi-cloud environments with the ability to scan container images. With the new extension, potentially dangerous operating system weaknesses in container images can be identified and automatically remedied. Increased Demand for Cloud Services Over the past year, the increased demand for cloud services has prompted many IT and security teams to accelerate their cloud migrations. In addition to an efficient and secure strategy for application delivery in the cloud ...

Read more

Reality of AI in cybersecurity
Reality of AI in cybersecurity

There is a lot of hype surrounding the use of artificial intelligence (AI) in cybersecurity. The truth is that the role and potential of AI in security are still evolving and much remains to be researched and evaluated. a comment by Chester Wisniewski, Principal Research Scientist, Sophos. In order to further develop AI as quickly as possible and to be able to use it even more efficiently in security, the overarching exchange between researchers and AI experts is particularly important. For this reason, Sophos AI is committed to sharing its research results openly with the ...

Read more