CryptoGuard: An asymmetric approach to the ransomware battle
In the second of our new technical thought leadership series, Sophos X-Ops takes a detailed look at anti-ransomware techniques
In the second of our new technical thought leadership series, Sophos X-Ops takes a detailed look at anti-ransomware techniques
Crimeware-as-a-service (CaaS) gang flies past CAPTCHAs, creating fraudulent accounts to sell to the likes of Scattered Spider; Microsoft mounts a…
Three years after the SolarWinds attack, new revelations show more must be done to help prevent such a drastic security…
Feeling creative? Submit your caption and our panel of experts will reward the winner with a $25 Amazon gift card.
Zoom's Vulnerability Impact Scoring System calculates the impact of a vulnerability to assign a cash payout for bugs, leading hackers…
Iranian officials blame a software issue for the "disruption" to gasoline pumps.
If you are in the market for a smartphone but want to break away from the Apple-Google duopoly, look no…
Attackers can spoof millions of email addresses to create targeted phishing attacks using flaws in Microsoft, GTX, and Cisco Secure…
CVE-2023-50164 is harder to exploit than the 2017 Struts bug behind the massive breach at Equifax, but don't underestimate the…
AI will make Meta's smart glasses more attractive for consumers. But can the company straddle cutting-edge functionality and responsible data…