Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

Sophos

Below you will find reports with the source of “Sophos”

image from 2017 Ransomware Defense Survey

2017 Ransomware Defense Survey

Some statistics that jump out from this report, 76% of respondents see ransomware as significant business threat, 52% rate their organizations at above average or superior when it comes to detecting or blocking ransomware before it locks or encrypts data in their systems, 57% say they are more likely to be a ransomware target in 2017.

(more available)
Added: October 23, 2018
image from SamSam Ransomware Chooses Its Targets Carefully

SamSam Ransomware Chooses Its Targets Carefully

This report takes a look at the SamSam ransomware. A ransomware that unlike most ransomware, goes after specific organizations.

Added: October 22, 2018
image from Rogueware Reborn: A Business Analysis Of A Growing Fraud In Android

Rogueware Reborn: A Business Analysis Of A Growing Fraud In Android

Rogueware has been reborn in the Android ecosystem, particularly on Google Play. This research paper reveals that hundreds of antivirus and optimization tool apps on Google Play mislead users into believing that they have a virus or performance problems on their devices to manipulate them to install other fake tools.

(more available)
Added: October 21, 2018
image from Ransomware As A Service (RaaS): Deconstructing Philadelphia

Ransomware As A Service (RaaS): Deconstructing Philadelphia

This report provides a thorough analysis of Philadelphia, a a chilling example of ransomware as a service.

Added: October 20, 2018
image from Machine Learning: How To Build A Better Threat Detection Model

Machine Learning: How To Build A Better Threat Detection Model

This is a very good guide to building a good threat detection model for machine learning.

Added: October 19, 2018
image from 2018 Malware Forecast

2018 Malware Forecast

In this report, they review malicious activity that SophosLabs analyzed and protected their clients from in 2017. They take that data and project what can be expected from 2018.

(more available)
Added: October 18, 2018
image from Looking ahead: SophosLabs 2017 malware forecast

Looking ahead: SophosLabs 2017 malware forecast

In this report, they review malicious activity SophosLabs analyzed and protected customers against last year and use the findings to paint a picture for 2017.

(more available)
Added: October 17, 2018
image from "Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

"Known Unkowns": Overcoming Catastrophic Failure Modes In Artificial Intelligence

This report takes a look at some of the problems in AI, and machine based cyber security, and seeks to show how they can be overcome.

(more available)
Added: October 16, 2018
image from "VPN Filter" Botnet: A Sophoslabs Analysis

"VPN Filter" Botnet: A Sophoslabs Analysis

This report provides a technical investigation of the malicious components involved in the attack that infected over 500,000 routers and network storage devices.

(more available)
Added: October 15, 2018
image from Guerilla Ad Clicker Targets Android Users

Guerilla Ad Clicker Targets Android Users

This report takes a look at a threat that specifically attacks Android users.

Added: October 15, 2018
image from A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

A Coming Flood or a Distant Storm? - The GDPR from a North American Perspective

This paper discusses how the GDPR will affect you as a non-European company and provides insights into what you should do to prepare.

(more available)
Added: October 14, 2018
image from The State Of Endpoint Security Today

The State Of Endpoint Security Today

This paper delivers insights into the prevalent cybersecurity issues facing organizations today: from ransomware to exploits and machine learning, it shares the experiences and future plans of IT managers across the globe. It’s an illuminating read, providing insight into where the field stands on these issues.

(more available)
Added: October 14, 2018
image from Firewall Best Practices To Block Ransomware

Firewall Best Practices To Block Ransomware

Recent ransomware attacks like Wanna and Petya have spread largely unchecked through corporate networks in recent months, extorting money to restore your data and regain control of your computers. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to do their job. In this whitepaper we’ll discuss how these attacks work, how they can be stopped, and best practices for configuring your firewall and network to give you the best protection possible.

(more available)
Added: October 13, 2018
image from The EU General Data Protection Regulation

The EU General Data Protection Regulation

This whitepaper discusses what the General Data Protection Regulation (GDPR) will mean to organizations globally.

Added: October 13, 2018
image from Don't Take The Bait

Don't Take The Bait

In this paper, we’ll dive into the evolution of phishing in recent years, how it works, and what it looks like. And as cybercriminals continue to prey on employees through their technology, we’ll make an argument for the importance of a multi-layered defense against phishing attacks: combining advanced security technologies with educated, phishing-aware employees.

(more available)
Added: October 12, 2018
image from The Dirty Secrets Of Network Firewalls

The Dirty Secrets Of Network Firewalls

In late 2017, Sophos sponsored an independent research study into the state of network security in mid-sized organizations across the globe. This research program explored the experiences, concerns, and future needs of IT managers, with particular focus on firewalls and network defenses.

(more available)
Added: October 12, 2018
  • ««
  • «
  • 1
  • 2
  • »
  • »»
© Cyentia Institute 2025
Library updated: July 1, 2025 16:08 UTC (build b1d7be4)