Synchronized Security and Security Heartbeat: Elevating Cyber Defenses, Automatically
The original and best cybersecurity system now includes Sophos Workspace Protection.
Categories: Products & Services
Tags: Workspace, Firewall, Endpoint
The latest Gcore Radar report analyzing attack data from Q1–Q2 2025, reveals a 41% year-on-year increase in total attack volume. The largest attack peaked at 2.2 Tbps, surpassing the 2 Tbps record in late 2024. Attacks are growing not only in scale but in sophistication, with longer durations, multi-layered strategies, and a shift in target…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added four security flaws to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The list of vulnerabilities is as follows – CVE-2025-68645 (CVSS score: 8.8) – A PHP remote file inclusion vulnerability in Synacor Zimbra Collaboration Suite (ZCS) that…
There’s an update to the City of Columbus, Ohio cyberattack by Rhysida that affected 500,000 residents but also resulted in the city trying to muzzle a whistleblower who tried to inform the community of the true extent of the breach. Jordan Laird reports: Days before the one-year anniversary of the cyberattack that temporarily crippled Columbus’ computer…
Iain Thomson reports: HCRG Care Group, a private health and social services provider, has seemingly fallen victim to the Medusa ransomware gang, which is threatening to leak what’s claimed to be stolen internal records unless a substantial ransom is paid. Previously known as Virgin Care and now owned by Twenty20 Capital, HCRG runs child and…
The Brussels Criminal Court has sentenced a Russian hacker to 7 years in prison. His former partner is sentenced to 5 years in prison, of which 1 year is suspended. The couple used the malicious software Crylock to remotely block computer files and demand ransom. In this way, they earned millions of euros. It is…
In the past year, cross-domain attacks have gained prominence as an emerging tactic among adversaries. These operations exploit weak points across multiple domains – including endpoints, identity systems and cloud environments – so the adversary can infiltrate organizations, move laterally and evade detection. eCrime groups like SCATTERED SPIDER and North Korea-nexus adversaries such as FAMOUS