Sophos

@sophos@infosec.exchange
425 Followers
9 Following
136 Posts
Defeat Cyberattacks
Check out our threat research @SophosXOps 
Get Sophos product help @SophosSupport

Today we released the 2025 Sophos Active Adversary Report (AAR), looking at data from 413 incident-response cases handled by our X-Ops MDR and IR teams in 2024. This edition of the report has a number of interesting findings, a vastly expanded dataset, and -- in honor of our fifth anniversary -- a gift for the curious. /1

https://news.sophos.com/en-us/2025/04/02/it-takes-two-the-2025-sophos-active-adversary-report/

It takes two: The 2025 Sophos Active Adversary Report

The dawn of our fifth year deepens our understanding of the enemies at the gate, and some tensions inside it; plus, an anniversary gift from us to you

Sophos News

On Friday, Ross McKerchar, Sophos' CISO, was featured on ITV News, discussing the latest developments in Chinese #CyberThreats. This follows our announcement of Pacific Rim, Sophos' 5-year defensive and counter-offensive operation targeting state-sponsored adversaries based in China.

The segment highlighted China’s growing role in cyberattacks against critical infrastructure and the evolving tactics of these cybercriminals.

If you missed it, watch the full story on ITV News: https://bit.ly/3WYzhHF

Tons of great Sophos research is dropping today which I’ll link in thread. China goes brrr.

I want to give them particular credit for directly talking about the cyber industry elephants in the room, both in the research and during media interviews

e.g. insecurity in appliances, need for industry change, monitoring threat actors through telemetry etc etc.

It’s really refreshing as they’re talking about what is *actually happening* - not all vendors do this.

https://www.wired.com/story/sophos-chengdu-china-five-year-hacker-war/

Inside Sophos' 5-Year War With the Chinese Hackers Hijacking Its Devices

Sophos went so far as to plant surveillance “implants” on its own devices to catch the hackers at work—and in doing so, revealed a glimpse into China's R&D pipeline of intrusion techniques.

WIRED

Sophos lifts the lid off a vast Chinese cyberespionage operation

Today, we’ve unveiled a defensive and counter-offensive operation with multiple interlinked nation-state adversaries based in China.

In our research named “Pacific Rim,” we disclose how the attackers used a series of campaigns with novel exploits and customized malware to conduct surveillance, sabotage and cyberespionage. Sophos also found overlapping tactics, tools and procedures (TTPs) with well-known Chinese nation-state groups, including Volt Typhoon, APT31 and APT41. The adversaries targeted both small and large critical infrastructure and government targets, primarily located in South and South-East Asia, including nuclear energy suppliers, a national capital’s airport, a military hospital, state security apparatus, and central government ministries.

Throughout Pacific Rim, Sophos X-Ops, our cybersecurity and threat intelligence unit, worked to neutralize the adversaries’ moves and continuously evolved defenses and counter-offensives.

After Sophos successfully responded to the initial attacks, the adversaries escalated their efforts and brought in more experienced operators. Sophos subsequently uncovered a vast adversarial ecosystem.

Ross McKerchar, CISO at Sophos, warns that critical infrastructure and #SMBs in the supply chain remain key targets. “Collaboration across sectors is vital to disrupt these long-term, complex attacks.”

For years, nation states have known that network devices are privileged, powerful and unmonitored places to hide, which is why radical transparency about vulnerabilities and patches and migrating End of Life (EOL) devices to modern technology is essential. The security industry needs to come together to create the changes necessary to stop fueling nation-state cyberattacks.


Read the full story here: https://bit.ly/4hvp0uT

Sophos' Pacific Rim: Defense Against Nation-state Hackers

Discover Sophos' Pacific Rim defense against nation-state / Chinese hackers Volt Typhoon, APT31, and APT41 targeting critical infrastructure.

SOPHOS

📢 Today, we’re excited to announce our definitive agreement to acquire Secureworks.

Cyber risk continues to escalate, driven by a rampant cybercriminal ecosystem and global geopolitical pressures. As two global leaders in cybersecurity, we share a long history of having remarkable threat intelligence, security operations, incident response, and innovative security product capabilities that help organizations defeat these adversaries.

By joining forces with Secureworks, we’re able to accelerate the delivery of advanced cybersecurity services and technology for organizations worldwide.

Read more: https://bit.ly/3Uh1LLe

Sophos to Acquire Secureworks to Accelerate Cybersecurity Services and Technology for Organizations Worldwide

Building a safer digital future for all.

Sophos News
Solid preparation now can save you from potential damage later. This #CybersecurityAwarenessMonth, we encourage your organization to prioritize your security posture with tabletop exercises. They can help you identify blind spots, improve communication and ensure your program is compliant for the future. Some popular tabletop scenarios include rapid-fire, technical-only and full-stakeholder. Read and learn the differences between the three and how they can help your team here: https://bit.ly/4gJW2ar
Cybersecurity as a Service Delivered | Sophos

We Deliver Superior Cybersecurity Outcomes for Real-World Organizations Worldwide with a Broad Portfolio of Advanced Security Products and Services.

SOPHOS

We’re happy to announce that Sophos #InterceptX was a winner in the CRN 2024 Tech Innovator Awards in the Endpoint Security category. Sophos MDR was also recognized as a finalist in the Managed Detection and Response category.

Our endpoint detection and response ratings reflect our commitment to advance organizations' defenses across industries. Read the results: https://bit.ly/4fU1PKb

2024 Tech Innovator Awards

The awards spotlight innovative products and services across 36 categories. The winners and finalists were chosen by CRN staff from among more than 320 product ...

In 2024, 67% of #healthcare organizations were hit by ransomware and average recovery costs increased year-over-year to $2.57 million. How can you prevent these attacks while protecting patients?

Frequent backups, dependable #endpoint solutions, and cyber threat awareness strengthen #PatientSecurity. Learn more in our State of Ransomware in Healthcare report: https://bit.ly/3yXAYMm

The State of Ransomware in Healthcare 2024

402 healthcare IT/cybersecurity leaders share their latest ransomware experiences, revealing fresh insights into the realities facing the healthcare sector today.

Sophos News

Risk tolerance varies across organizations. Many struggle to manage cyber risk effectively, often focusing on individual threats and challenges rather than adopting a strategic, holistic approach.

In Forbes, Raja Patel, chief product officer at Sophos, explores how to a four-part framework aligns your risk tolerance and resource availability to your #RiskManagement strategy. Learn more: https://bit.ly/3YPdYdi

Median #ransomware recovery costs for two critical infrastructure sectors, Energy and Water, quadrupled to $3 million this year, according to The State of Ransomware in Critical Infrastructure 2024 report, released today.

"Criminals focus where they can cause the most pain and disruption so the public will demand quick resolutions, and they hope, ransom payments to restore services more quickly. This makes utilities prime targets for ransomware attacks,” says Chester Wisniewski, global field CTO at Sophos.

Get more #CriticalInfrastructure insights: https://bit.ly/3WrK4dm

The State of Ransomware in Critical Infrastructure 2024

275 IT/cybersecurity leaders from the energy, oil/gas and utilities sector share their ransomware experiences, providing new insights into the business impact of ransomware.

Sophos News