Sophos Threat Report 2022: Malware, Mobile, Machine learning and more!

The crooks have shown that they’re willing to learn and adapt their attacks, so we need to make sure we learn and adapt, too.
Want to know more about this topic or about us? Contact us!
The crooks have shown that they’re willing to learn and adapt their attacks, so we need to make sure we learn and adapt, too.
The cyberattack incident is the wireless carrier’s fourth in three years. T-Mobile USA has reported a data breach – its fourth in three years. The wireless carrier disclosed the breach last week via its website, saying that it detected and shut down “malicious, unauthorized access to some information” related to . . . Read more
Threatpost explores 5 big takeaways from 2020 — and what they mean for 2021. Goodbye, 2020 — and good riddance, right? Most of us don’t want to take too much from this year into the next — but let’s make an exception for what we learned about security in the . . . Read more
by Anthony Merry October is Cybersecurity Awareness Month. We asked Anthony Merry, senior director, Product Management at Sophos, for his top mobile privacy tips. If you’ve updated your Apple phone or your Android to the latest version – iOS 14 and Android 11 respectively – you may have noticed that . . . Read more
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
The administrator of your personal data will be Threatpost, Inc., 500 Unicorn Park, Woburn, MA 01801. Detailed information on the processing of personal data can be found in the privacy policy. In addition, you will find them in the message confirming the subscription to the newsletter.
Rare attack on cellular protocol exploits an encryption-implementation flaw at base stations to record voice calls.