What is…an exploit?

shutterstock_189045062Most cyberattacks involve criminals exploiting some sort of security weakness.

That weakness could be down to a poorly chosen password, a user who falls for a fake login link, or an attachment that someone opened without thinking.

However, in the field of computer security, the word exploit has a specific meaning: an exploit is a way of abusing a software bug to bypass one or more security protections that are in place.

Software bugs that can be exploited in this way are known as vulnerabilities, for obvious reasons, and can take many forms.

Continue reading

Watch now – Sophos Intercept X in two minutes!

sophos-intercept-x-icon-150Today’s cybercriminals are more sophisticated than ever, and next-generation attacks call for next-generation solutions.

Launched last week, Sophos Intercept X is a completely new approach to endpoint security.

It features signatureless anti-exploit, anti-ransomware and anti-hacker technology that includes visual root-cause analysis and advanced malware cleanup – all managed via the Sophos Central Admin console.

No other solution on the market offers so many features in a single package.

Want to know more? Watch our video!

Continue reading

Sophos XG Firewall is coming to Microsoft Azure

XG FirewallWe are excited to announce that Sophos XG Firewall is coming to Microsoft Azure in October.

Sophos XG Firewall is a next-generation firewall that deploys as an all-in-one solution. It combines advanced networking with protections such as Intrusion Prevention (IPS) and Web Application Firewall (WAF), as well as user and application controls.

Sophos XG Firewall is designed to help you protect your Azure-based workloads against advanced threats.

Continue reading

Introducing Sophos Intercept X – a completely new approach to endpoint security

sophos-intercept-x-icon-150At Sophos, we’re no strangers to next-generation security. You can see it across our entire product line, from our powerful Security Heartbeat technology that leverages Sophos Central to facilitate communication between endpoints and the network, to our advanced behavioral analytics and malicious traffic detection features (and a whole lot more).

Today, with the introduction of Sophos Intercept X, we’re taking a massive leap forward in next-generation protection – not just for Sophos, but across the entire security industry as a whole.

Continue reading

Sophos Mobile Control offers same-day iOS 10 compatibility

ios-10Apple has made iOS 10 available and will push upgrade notifications out to devices over the next few days. Some early adopters even have iOS 10 already installed!

Good news – Sophos Mobile Control is ready with same-day support of iOS 10. Once iOS 10 is loaded onto your users’ devices, it’ll be supported by all components of Sophos Mobile Control.

For a comprehensive list of iOS 10 features, please visit Apple’s iOS product page. Another good source of information about iOS 10 and the newly-announced Apple gadgets is Digg.com’s live blog from Apple’s recent iPhone 7 keynote.

Continue reading

Sophos showcases anti-ransomware technologies and more at Cloud Expo Asia 2016

CloudExpoAsiaThe future of cloud security is a hot topic, and we can expect further insights on the subject at Cloud Expo Asia 2016, which happens on 12 and 13 October in Singapore.

Sophos will be there, as the official Cloud Security Expo Keynote Theatre sponsor where our security experts will be giving talks, and at the Sophos booth (P9). Our friendly team will be on hand with tips and advice, so make sure you stop by the booth and say hi!

Throughout the two-day event, you’ll hear from our Sophos experts, including:

Continue reading

New SophosLabs research: Cryptomining malware on NAS servers worldwide

sophoslabs-150SophosLabs has just released a research paper on a new way that cybercriminals are distributing malware that makes money by “borrowing” your computer to mine cryptocurrency.

The report by Attila Marosi, Senior Threat Researcher at Sophos, investigates the Mal/Miner-C malware, which criminals are using to mine the cryptocurrency Monero.

In this paper, Marosi examines how Mal/Miner-C quietly infects victims’ computers and communicates with host servers to run mining operations covertly in the background.

Continue reading