Sophos India Volunteers Bring Color to Local Schools
Sophos India volunteers transformed two rural schools with vibrant murals, enhancing learning spaces and strengthening community ties.
Sophos India volunteers transformed two rural schools with vibrant murals, enhancing learning spaces and strengthening community ties.
Intro: Why hack in when you can log in? SaaS applications are the backbone of modern organizations, powering productivity and operational efficiency. But every new app introduces critical security risks through app integrations and multiple users, creating easy access points for threat actors. As a result, SaaS breaches have increased, and according to a May…
Cybersecurity researchers have unearthed a new controller component associated with a known backdoor called BPFDoor as part of cyber attacks targeting telecommunications, finance, and retail sectors in South Korea, Hong Kong, Myanmar, Malaysia, and Egypt in 2024. “The controller could open a reverse shell,” Trend Micro researcher Fernando Mercês said in a technical report published…
Dan Cooper, Benjamin Haley, Deon Govender, Ahmed Mokdad, and Mosa Mkhize of Covington and Burling write: On April 7, 2025, South Africa’s Information Regulator announced a new requirement for organizations to report data breaches—referred to under local law as “security compromises”—via an online eServices Portal. The announcement marks a significant procedural shift in how companies must comply with…
Ransomware remains the biggest threat, but old and misconfigured network devices are making it too easy
These are the tools of the trade Sophos detected in use by cybercriminals over 2024
Cheap Android smartphones manufactured by Chinese companies have been observed pre-installed with trojanized apps masquerading as WhatsApp and Telegram that contain cryptocurrency clipper functionality as part of a campaign since June 2024. While using malware-laced apps to steal financial information is not a new phenomenon, the new findings from Russian antivirus vendor Doctor Web point…
The U.S. government funding for non-profit research giant MITRE to operate and maintain its Common Vulnerabilities and Exposures (CVE) program will expire Wednesday, an unprecedented development that could shake up one of the foundational pillars of the global cybersecurity ecosystem. The 25-year-old CVE program is a valuable tool for vulnerability management, offering a de facto…
BakerHostetler has released its 2025 Data Security Incident Response Report. This year, their annual report is based on their involvement in 1,250 data security cases. Some of The Key Findings: Companies are starting to win the battle against ransomware. Successful attacks are fewer. Time to restore is faster. Payments are lower. Forensic investigation costs dropped dramatically, marking a…
How to make the most of the new features in Sophos Firewall v21.5