At Sophos X-Ops, we often get queries from our customers asking if they’re protected against certain malware variants. At first glance, a recent question...
Jun 05, 2025Ravie LakshmananNetwork Security / Vulnerability
Cisco has released security patches to address a critical security flaw impacting the Identity Services Engine (ISE) that,...
The risks associated with containerized environments
Although containers provide an isolated runtime environment for applications, this isolation is often overestimated. While containers encapsulate dependencies and...
The UK’s Ministry of Defence has revealed that it was the target of a sophisticated, cyber attack that saw Russia-linked hackers pose as journalists.The...
Sophos MDR recently responded to a targeted attack involving a Managed Service Provider (MSP). In this incident, a threat actor gained access to the...
May 27, 2025Ravie LakshmananCloud Security / Threat Intelligence
Misconfigured Docker API instances have become the target of a new malware campaign that transforms them into...
Ransomware is usually a crime of opportunity. Attackers typically strike through an easily-discovered vulnerability or security weakness— unpatched Internet-facing software, vulnerable network edge devices...
Introduction
Imagine a container zombie outbreak where a single infected container scans the internet for an exposed Docker API, and bites exploits it by creating...