Sophos Firewall v21.5: NDR Essentials
How to make the most of the new features in Sophos Firewall v21.5
Identity-based attacks are on the rise. Attacks in which malicious actors assume the identity of an entity to easily gain access to resources and sensitive data have been increasing in number and frequency over the last few years. Some recent reports estimate that 83% of attacks involve compromised secrets. According to reports such as the…
Luke Alsford reports: A prestigious IVF clinic has confirmed Russian hackers broke into their systems used by thousands of couples across the UK after Metro revealed the huge data breach. The London Women’s Clinic, which offers IVF, egg freezing and other fertility treatments at 17 centres across the country, was compromised by the ransomware gang Qilin. A……
EPIC writes: A strong comprehensive privacy bill passed the Maine House of Representatives today. The bill, LD 1822, closely mirrors the privacy law Maryland passed in 2024 and would extend essential privacy protections to Mainers. The bill includes strong data minimization requirements, enhanced protections for sensitive data, and civil rights protections prohibiting data-driven discrimination. EPIC has testified in support of……
Edtech vendor Illuminate Education, Inc. is still feeling the consequences of a hacking incident in 2021 that affected millions of students. They recently settled charges by three state attorneys general for $5.1 million and a corrective action plan. Now the FTC has announced its own enforcement action: The Federal Trade Commission will require education technology……
The online world never takes a break, and this week shows why. From ransomware creators being caught to hackers backed by governments trying new tricks, the message is clear: cybercriminals are always changing how they attack, and we need to keep up. Hackers are using everyday tools in harmful ways, hiding spyware in trusted apps,…
Detecting leaked credentials is only half the battle. The real challenge—and often the neglected half of the equation—is what happens after detection. New research from GitGuardian’s State of Secrets Sprawl 2025 report reveals a disturbing trend: the vast majority of exposed company secrets discovered in public repositories remain valid for years after detection, creating an…