
Sophos

Sophos AI at Black Hat USA ’25: Anomaly detection betrayed us, so we gave it a new job
Anomaly detection in cybersecurity has long promised the ability to identify threats by highlighting deviations from expected behavior. When it comes to identifying malicious commands, however, its practical application often results in high rates of false positives – making it expensive and inefficient. But with recent innovations in AI, is there a new angle that…

Sophos’ Secure by Design 2025 Progress
In 2024, we became one of the first organizations to commit to CISA’s Secure by Design initiative. Aligned with our core organizational values around transparency, Secure by Design has been a guiding force as we continually evaluate and improve our security practices. We recently passed the one-year anniversary of publishing our pledges for improvement and…

Sweet 16: Sophos named a Leader (again) in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms
Sophos is proud to announce that we have been named a Leader in the 2025 Gartner® Magic Quadrant™ for Endpoint Protection Platforms, marking our 16th consecutive report as a Leader in this category. Sophos is recognized as a Leader among a total of 15 endpoint protection (EPP), endpoint detection and response (EDR), extended detection and…

Sophos Firewall v21.5 is now available
Following a very busy and successful early access program, the Sophos Firewall team is pleased to announce that v21.5 is now available to all licensed Sophos partners and customers. This release brings an industry-first innovation: integrating Network Detection and Response (NDR), which enhances active threat detection on your network. What’s new overview Watch this brief…

An industry first: Sophos Firewall and NDR Essentials
Sophos Firewall v21.5 introduces an innovative industry first: Network Detection and Response (NDR) integrated with a firewall. Why NDR is Important Network Detection and Response (NDR) is a category of network security products designed to detect abnormal traffic behavior, helping identify active adversaries operating on the network. Skilled attackers are very effective at evading detection,…

Sophos MDR: New analyst response actions for Microsoft 365
Businesses of all sizes are increasingly reliant on productivity tools like Microsoft 365 — and attackers are using this to their advantage. Business email compromise and account takeover attacks are prevalent, with adversaries accessing M365 environments using techniques that may evade detection by technology alone. Organizations need 24/7 visibility and a fully staffed security operations…

The Sophos Annual Threat Report: Cybercrime on Main Street 2025
Small businesses are a prime target for cybercrime, as we highlighted in our last annual report. Many of the criminal threats we covered in that report remained a major menace in 2024, including ransomware–which remains a primary existential cyber threat to small and midsized organizations. Ransomware cases accounted for 70 percent of Sophos Incident Response…

Sophos Annual Threat Report appendix: Most frequently encountered malware and abused software
This appendix to our Annual Threat Report provides additional statistics on incident data and telemetry detailing the tools used by cybercriminals targeting small and midsized businesses (SMBs). For a broader look at the threat landscape facing SMBs, see our main report. Appendix Contents: Most frequently-encountered malware types Small and midsized businesses face a vast set…

Sophos Firewall v21.5 early access is now available
We’re pleased to announce that the early access program (EAP) is now underway for the latest Sophos Firewall release. This update brings exciting industry-first enhancements and top-requested features, including… Sophos NDR Essentials integration Set up and monitor NDR Essentials threat feeds under the Active Threat Response menu. Sophos Firewall customers with Xstream Protection now get…

It takes two: The 2025 Sophos Active Adversary Report
The Sophos Active Adversary Report celebrates its fifth anniversary this year. The report grew out of a simple question: What happens after attackers breach a company? Knowing the adversary’s playbook, after all, helps defenders better battle an active attack. (There’s a reason we started life as “The Active Adversary Playbook.”) At the same time we…
- 1
- 2