We need secure products as much as we need security products
Buyers need to demand better.
For the 16th consecutive report, Sophos has been recognized by Gartner as a Leader in the Endpoint Protection Platforms (EPP) category.
On August 7, external counsel for Connex Credit Union (“Connex”) in Connecticut notified the Maine Attorney General’s Office of a recent hacking incident. According to their notification, unusual activity was discovered on their system on June 3, 2025. An investigation that was promptly launched determined that files may have been accessed or downloaded without authorization……
Elizabeth F. Greene and Kristen Dupard pf Bradley Arant Boult Cummings LLP write: The Department of Justice (DOJ) recently obtained several cybersecurity-related False Claims Act (FCA) settlements totaling more than $50 million dollars. Collectively, these settlements reflect a clear message: Cybersecurity is an enforcement priority for the second Trump administration, and any organization that contracts……
Excerpts from a press release today by the Dutch Police after several investigations by the Cybercrime Team of the Zeeland-West-Brabant unit revealed that suspects had an account on the Cracked.io platform. Dutch police, in collaboration with other countries involved in Europol, were able to secure and take down servers and identify individual users. Ultimately, 126 individual…
Threat hunters are calling attention to a new campaign that has targeted Fortinet FortiGate firewall devices with management interfaces exposed on the public internet. “The campaign involved unauthorized administrative logins on management interfaces of firewalls, creation of new accounts, SSL VPN authentication through those accounts, and various other configuration changes,” cybersecurity firm
Most cyberattacks today don’t start with loud alarms or broken firewalls. They start quietly—inside tools and websites your business already trusts. It’s called “Living Off Trusted Sites” (LOTS)—and it’s the new favorite strategy of modern attackers. Instead of breaking in, they blend in. Hackers are using well-known platforms like Google, Microsoft, Dropbox, and Slack as…