Phake phishing: Phundamental or pholly?
Debates over the effectiveness of phishing simulations are widespread. Sophos X-Ops looks at the arguments for and against – and our own phishing philosophy
While AI tools can enable employees to be innovative and productive, significant data privacy risks can stem from their usage. The post Beware Of Shadow AI – Shadow IT’s Less Well-Known Brother appeared first on SecurityWeek.
How to make the most of the new features in Sophos Firewall v21.5.
On March 26, DataBreaches linked to reporting by the Chattanooga Times Free Press. Their report indicated that the local government had not notified residents of a data breach potentially affecting 14,000 people despite having been notified of the incident 240 days ago. According to the memo, the firm sent a letter on Feb. 17 saying…
Two high-severity security flaws have been disclosed in the open-source ruby-saml library that could allow malicious actors to bypass Security Assertion Markup Language (SAML) authentication protections. SAML is an XML-based markup language and open-standard used for exchanging authentication and authorization data between parties, enabling features like single sign-on (SSO), which allows
Christine Chen reports: Hackers targeting Australia’s major pension funds in a series of coordinated attacks have stolen savings from some members at the biggest fund, according to a source with knowledge of the matter, and compromised more than 20,000 accounts. National Cyber Security Coordinator Michelle McGuinness said in a statement she was aware of “cyber…
An ongoing campaign has been observed targeting Amazon Web Services (AWS) customers using compromised Identity and Access Management (IAM) credentials to enable cryptocurrency mining. The activity, first detected by Amazon’s GuardDuty managed threat detection service and its automated security monitoring systems on November 2, 2025, employs never-before-seen persistence techniques to hamper