Intercept X、Server、XDR、Mobile
Firewall、ゼロトラスト、Wireless、Switch
XDR、Managed Threat Response、Rapid Response、Refactr
メール保護
Cloud Optix、クラウドワークロード保護、ゼロトラスト、Firewall
個人向けの Mac や PC の保護
If you can see this then you have CSS disabled. This is a honeypot to catch bots, leave this textbox empty
127.0.0.1
エラーが発生しました。後でもう一度やり直してください。
スパムメール発信元の疑いがある IP アドレスの検索ツールをご利用いただけます。
Submit An Appeal
IP Address Classification Policy
Share your questions, answers, advice and comments about threats in the Sophos Community.
Interrelated threats are now targeting an interdependent world. It’s up to IT professionals to proactively deal with these trends to meet the challenges just on the horizon and beyond.
In security we spend a lot of time trying to decipher the future. Where’s the next technology breakthrough? What are cybercriminals going to do next?
Annual threat reports provide an opportunity to look back at significant events of the past 12 months and identify trends for future development, action and protection. Looking back in time a little further helps to provide context for how we arrived at our current situation and why some things are the way they are. A long view of history can point to subtle changes or seismic shifts within an industry.
Kingminer is an opportunistic botnet that keeps quiet and flies under the radar. The operators are ambitious and capable, but don’t have endless resources – they use any solution and concept that is freely available, getting inspiration from public domain tools as well as techniques used by APT groups.
The botnet known as MyKings wields a wide range of automated methods to break into servers – all just to install cryptocurrency miners.
As much of the world shifted to remote work in 2020, cybercriminals upped their game, devising ways to use the fears and anxieties of organizations and end users against them.
An investigation into an attack against a cloud computing server reveals an unusual and innovative way for malware to communicate through Amazon’s firewalls
Network security threats explained: Social engineering
Petya Ransomware Attack: How to Protect Yourself
How WannaCry ransomware works
Comparing the incomparables Gábor Szappanos
Practical Shellcode Analysis Gábor Szappanos