Threat Research
virtual machine
QEMU
PayoutsKing
GOLD ENCOUNTER
CitrixBleed2
The use of hidden virtual machines (VMs) enables long-term access, credential harvesting, data exfiltration, and PayoutsKing ransomware deployment
Sophos Insights
LLM
AI
Exploit
vulnerability
Active Adversary
Pacific Rim
We can't control the pace of AI-driven vulnerability discovery, but we can control how fast we respond.
OpenClaw
penetration testing
Red Team
CISO
Sophos X-Ops
Following our article on the challenges posed by agentic AI, we gave OpenClaw access to one of our legacy networks
Products & Services
Compliance
No matter the country, industry, or company size, IT and cybersecurity teams report a heavy regulatory load and worry about staying aligned with requirements