News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Reality of AI in cybersecurity
Reality of AI in cybersecurity

There is a lot of hype surrounding the use of artificial intelligence (AI) in cybersecurity. The truth is that the role and potential of AI in security are still evolving and much remains to be researched and evaluated. a comment by Chester Wisniewski, Principal Research Scientist, Sophos. In order to further develop AI as quickly as possible and to be able to use it even more efficiently in security, the overarching exchange between researchers and AI experts is particularly important. For this reason, Sophos AI is committed to sharing its research results openly with the ...

Read more

Vulnerability liars get rewards
Vulnerability liars get rewards

Bug bounty programs are designed to uncover vulnerabilities and there are rewards for doing so. But more and more free riders are reporting weaknesses in SME websites that are none at all and want to cash in as helpers in an emergency. Companies are increasingly using bug bounty programs to uncover potential security vulnerabilities. The flourishing business also calls for free-riding motivated by criminals on the scene - the so-called “Beg Bounty Hunter” primarily target small companies. Bug bounty programs exploited The search for bugs in your own products and, as a result, the closing of potential doors for cyber attacks is always a problem with increasing digitization ...

Read more

DearCry targets Microsoft Exchange vulnerability
SophosNews

Hafnium Microsoft Exchange Hack: Was the DearCry ransomware prototype entered? Sophos experts have investigated the ransomware and discovered similarities with WannaCry. Since the Microsoft Exchange vulnerabilities became known last week, the focus has been on cyberattacks that exploit this vulnerability. Above all, the ransomware "DearCry" has made an inglorious name for itself, which at first glance reminds of a prominent predecessor called "WannaCry". Sophos Labs took a closer look at the new malware and found a lot of evidence that it could be an as yet unknown ransomware prototype. DearCry: ransomware ...

Read more

Sophos decrypts DNA fileless malware
Sophos decrypts DNA fileless malware

Sophos decrypts the DNA of fileless malware - and introduces new protection technology. Dynamic Shellcode Protection detects malware such as ransomware or remote access agents running in the temporary memory and thus blocks a popular hacking technique to bypass protection programs. Sophos presents its new protection against cyberattacks, in which malware is loaded into the temporary memory of the affected computer without files. Dynamic Shellcode Protection is integrated in Sophos Intercept X and can prevent attack code from nesting in the dynamic heap region of the memory. Memory: popular hiding place for malware The memory area of ​​a hacked computer is a ...

Read more

Intercept X protects Snapdragon computing platforms
Intercept X protects Snapdragon computing platforms

Sophos Intercept X keeps Qualcomm's Snapdragon computing platforms safe. Next generation cybersecurity for PCs with 5G technology. Sophos today announced its plans to provide Intercept X endpoint protection for 5G PCs based on Qualcomm® Snapdragon ™ computing platforms from Qualcomm Technologies Inc. The combination of Sophos Intercept X with Snapdragon computing platforms offers users a next-generation security environment in a PC environment that is active around the clock and always connected to the Internet. Sophos Intercept X for Snapdragon Compute Platforms is expected to be available in the second half of 2021….

Read more

Gootloader: Banking Trojan mutates into malware platform
SophosNews

“Gootkit” becomes “Gootloader”: Banking Trojan mutates into a complex malware platform with multiple attack vectors. The Gootkit malware family is a well-known henchman - a Trojan that initially focuses on the theft of banking business data and today uses the Cobalt-Strike analysis tool, the Kronos banking malware and the REvil ransomware, among other things. IT security experts have already dealt intensively with the malware and, in particular, with its clever transmission mechanisms in 2020. What is new is that the attackers have expanded the malware into a multi-payload platform. With variable attack mechanisms - including social engineering - it is strongest in Germany today ...

Read more

Graphics chip with anti-cryptomining software driver
SophosNews

No more prospecting ?! New graphics chip with anti-cryptomining software driver on the market. On the occasion of the market launch of Nvidia's RTX 3060, Sophos security expert Paul Ducklin dealt in detail with the chip manufacturer's announcement that it would integrate anti-cryptomining software drivers into the new product. For example, the fact that Nvidia wants to lock out crypto mining with its RTX 3060 has a good reason: “The dilemma of modern GPUs is that, in addition to all the features that appeal to gamers and digital artists, they are also pretty good at performing cryptographic calculations z. B. the calculation of hashes like SHA-2 and SHA-3 with high ...

Read more

20 years of cyber threat
Sophos Report 20 Years of Cyber ​​Threat

Sophos gives a comprehensive review of cyber threats and events over the past two decades and shows the various epochs in which worms, Stuxnet or ransomware dominated.The end of the year is always a good time to look at the current cyber threat landscape and make predictions about it to dare where it could develop. Annual reports like the Sophos 2021 Threat Report support this process. They provide a clear overview of the most important threat events over the past twelve months and show trends and future protective measures. But a look back over several years ...

Read more

How attackers use evasion techniques
SophosNews

SophosLabs has released a new report “How Sunburst Malware Does Defense Evasion”. Sean Gallagher, Senior Threat Researcher at Sophos explains the background. The report uses a micro-analysis to show how attackers use evasion techniques to avoid detection by security technologies for as long as possible. According to the SophosLabs analysis, Sunburst uses a compromised software component for using SolarWinds' Orion to detect or even disable protective software on the target systems. SophosLabs has deconstructed the code used by Sunburst and provides an overview that researchers and security...

Read more

Research: Egregor ransomware dismantled
SophosNews

Sophos researchers have taken a close look at the egregor ransomware. Is the ransomware the secret heir to Maze? The report “Egregor ransomware: Maze's heir apparent,” relies on several incidents Egregor has been involved in since September. Among other things, Sophos researchers found: Different tactics, techniques and procedures (TTPs) for attacks by different authors, which show how much criminal RaaS customers can vary their attack approaches and thus make defense protection more difficult. B. the use of the ChaCha and RSA encryption algorithms connections between Egregor and Sekhmet (Egregor is a derivative of ...

Read more