Sophos MDR: New analyst response actions for Microsoft 365
Powerful new capabilities enable Sophos MDR analysts to respond to M365 attacks on your behalf.
An ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and technology service providers, as ShinyHunters and Scattered Spider appear to be working hand in hand, new findings show. “This latest wave of ShinyHunters-attributed attacks reveals a dramatic shift in tactics, moving beyond the group’s previous credential theft and…
The Moscow Times reports: A wave of coordinated cyberattacks has paralyzed the digital systems of several major Russian restaurant chains and food service providers, the Vedomosti business daily reported. The attacks, which began on July 18, targeted networks run by automation provider iiko and its hosting partner ESTT. Restaurant chains including McDonald’s successor Vkusno i Tochka, coffee chain…
Customers gain immediate access to combined prevention, detection, and response capabilities in a single platform – while lowering costs and simplifying operations.
Cybersecurity researchers have discovered two new malicious extensions on the Chrome Web Store that are designed to exfiltrate OpenAI ChatGPT and DeepSeek conversations alongside browsing data to servers under the attackers’ control. The names of the extensions, which collectively have over 900,000 users, are below – Chat GPT for Chrome with GPT-5, Claude Sonnet &…
Microsoft Entra ID (formerly Azure Active Directory) is the backbone of modern identity management, enabling secure access to the applications, data, and services your business relies on. As hybrid work and cloud adoption accelerate, Entra ID plays an even more central role — managing authentication, enforcing policy, and connecting users across distributed environments. That prominence…
Why do SOC teams still drown in alerts even after spending big on security tools? False positives pile up, stealthy threats slip through, and critical incidents get buried in the noise. Top CISOs have realized the solution isn’t adding more and more tools to SOC workflows but giving analysts the speed and visibility they need…