Blog

We’re at Black Hat 2018, and we’re bringing the light!

Sessions, briefings, information, insight, experts, socks and a drone - what more could you want? Read More...

Understanding WebAssembly, and its hackability (video)

We investigate the WASM engine, which operates in a "portable and sandboxed" virtual machine inside the browser Read More...

What is… cryptojacking?

The dark side of cryptomining. Read More...

Finally, A Way To Send Malicious PDFs With URLs In Russian Letters

Spammers increasingly use PDF's ability to embed hyperlinks into documents to direct recipients of malicious PDFs to open malicious Web sites. We've discovered a spam campaign using internationalized URLs embedded in PDF document attachments. Read More...

Spearphishers tool up for attack targeting builders

A sophisticated spearphishing attack targets construction contractors in Boulder County, Colorado in the latest iteration of a months-long campaign. Read More...

How to make the most of your Sophos Endpoint

Introducing your new go-to place for all things Intercept X and Sophos Central Endpoint. Read More...

Sophos ranks #1 for endpoint protection by SE Labs

Intercept X Advanced makes the top of the table in its first public testing. Read More...

Gartner names Sophos as a ‘Visionary’ in the first UEM Magic Quadrant

We've been named a Visionary in Gartner's Magic Quadrant for Unified Threat Management. Read More...

Red Alert 2.0: Android Trojan targets security-seekers

A malicious, counterfeit version of a VPN client for mobile devices targets security-minded victims with a RAT. Read More...

Take a tour of Sophos Central’s Endpoint and Intercept X Protection

Hit the ground running with our endpoint features in Sophos Central. Read More...

Contact

SpartanTec, Inc.SpartanTec, Inc. Logo $$$

Social Media

  • Facebook
  • Twitter
  • LinkedIn
  • RSS