Sophos AI Agents: Accelerating MDR and Powering the Agentic SOC
Agentic intelligence in Sophos MDR: A practical, outcome-focused approach
Categories: Products & Services
Tags: MDR, Sophos MDR, AI
Apple on Tuesday released a security update to address a zero-day flaw that it said has been exploited in “extremely sophisticated” attacks. The vulnerability has been assigned the CVE identifier CVE-2025-24201 and is rooted in the WebKit web browser engine component. It has been described as an out-of-bounds write issue that could allow an attacker…
Government, financial, and industrial organizations located in Asia, Africa, and Latin America are the target of a new campaign dubbed PassiveNeuron, according to findings from Kaspersky. The cyber espionage activity was first flagged by the Russian cybersecurity vendor in November 2024, when it disclosed a set of attacks aimed at government entities in Latin America…
Attackers have been exploiting a second vulnerability in BeyondTrust’s remote management solutions, CISA warns. The post CISA Warns of Second BeyondTrust Vulnerability Exploited in Attacks appeared first on SecurityWeek.
The U.K. National Crime Agency (NCA) on Thursday announced that four people have been arrested in connection with cyber attacks targeting major retailers Marks & Spencer, Co-op, and Harrods. The arrested individuals include two men aged 19, a third aged 17, and a 20-year-old woman. They were apprehended in the West Midlands and London on…
Mark Emem reports a settlement in litigation stemming from a Consulting Radiologists Ltd. data breach in February 2024. The incident had been added to LockBit’s leak site in April 2024. A US healthcare firm has agreed to pay out millions of dollars to settle a class action lawsuit filed over a data breach that occurred……
Cybersecurity researchers have disclosed details of a phishing campaign that involves the attackers impersonating legitimate Google-generated messages by abusing Google Cloud’s Application Integration service to distribute emails. The activity, Check Point said, takes advantage of the trust associated with Google Cloud infrastructure to send the messages from a legitimate email address (“