Tag Sophos

MDR and EDR Markets Experience Surge in M&A Activity Amid Intensifying Competition

Endpoint Detection & Response (EDR), Managed Detection & Response (MDR), Next-Generation Technologies & Secure Development Vendors Consolidate Endpoint, Managed Offerings to Combat Major Industry Players Michael Novinson (MichaelNovinson) • February 21, 2025 Image: Shutterstock The competitive dynamics among Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) service…

Read MoreMDR and EDR Markets Experience Surge in M&A Activity Amid Intensifying Competition

Five Eyes Issues Guidance for Securing Edge Devices

Network Firewalls, Network Access Control, Security Operations Guidance Aimed at Enhancing Rapid Compromise Detection for Enterprises Akshaya Asokan (asokan_akshaya) • February 5, 2025 Image: Shutterstock In a significant move to bolster cybersecurity, the Five Eyes intelligence coalition has released a set of minimum security requirements aimed at edge device vendors.…

Read MoreFive Eyes Issues Guidance for Securing Edge Devices

Nation-State Actors Capitalize on Gemini AI Application

Artificial Intelligence & Machine Learning, Next-Generation Technologies & Secure Development Google Identifies Iranian and Chinese Threat Groups as Most Active Users of AI Tools Akshaya Asokan (asokan_akshaya) • January 30, 2025 Image: Shutterstock Recent disclosures from Google reveal that Iranian and Chinese threat actors are leveraging the company’s artificial intelligence…

Read MoreNation-State Actors Capitalize on Gemini AI Application

Addressing Vulnerability Lags Exploited by Salt Typhoon

Critical Infrastructure Security, Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Chinese Hackers Target Unpatched Microsoft, Sophos, Fortinet, and Ivanti Products Mathew J. Schwartz (euroinfosec) • January 24, 2025 Image: Shutterstock In a significant breach, Chinese state-sponsored hackers have been exploiting vulnerabilities in the telecommunications networks of the U.S. and…

Read MoreAddressing Vulnerability Lags Exploited by Salt Typhoon

US Discovers Hacking Group Responsible for Salt Typhoon Telecom Breaches

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime, Standards, Regulations & Compliance U.S. Treasury Implements Sanctions Amid Cybersecurity Breaches David Perera (@daveperera) • January 17, 2025 Image: Shutterstock On January 17, 2025, the U.S. federal government announced that it has successfully traced intrusions by Chinese hackers targeting telecommunications networks back…

Read MoreUS Discovers Hacking Group Responsible for Salt Typhoon Telecom Breaches

Chinese Hack Compromises US Sanctions Office in Treasury Breach

Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Chinese Hackers Allegedly Target U.S. Treasury Department Offices Related to Economic Sanctions By Chris Riotta (@chrisriotta) • January 2, 2025 Chinese nation-state hackers infiltrated several U.S. Treasury Department offices. (Image: Shutterstock) A recent cyber intrusion linked to Chinese hackers has successfully breached…

Read MoreChinese Hack Compromises US Sanctions Office in Treasury Breach

Turmoil Strikes the Rockstar 2FA Phishing-as-a-Service Toolkit

As 2024 draws to a close, cybersecurity firms are reporting significant upheaval in the cybercrime landscape, particularly relating to phishing-as-a-service operations. Recent assessments by Sophos indicate that the once-prominent phish-tool Rockstar 2FA, notorious for its sophisticated phishing campaigns, has reportedly ceased operations. Following this disruption, many of its users have…

Read MoreTurmoil Strikes the Rockstar 2FA Phishing-as-a-Service Toolkit