Powerful new capabilities enable Sophos MDR analysts to respond to M365 attacks on your behalf.…
Read More →In the last of our five-part series, Sophos X-Ops explores the implications and opportunities arising from threat actors’ involvement in…
Read More →In the fourth of our five-part series, Sophos X-Ops explores threat actors’ real-world criminal business interests…
Read More →In the third of our five-part series, Sophos X-Ops explores the more legally and ethically dubious business interests of financially…
Read More →In the second of our five-part series, Sophos X-Ops investigates the so-called ‘white’ (legitimate) business interests of threat actors…
Read More →Twice a year, state attorneys general consumer protection staff gather to discuss consumer protection issues. Our state attorney general team…
Read More →On May 12, 2025, the Securities and Exchange Commission (“SEC”) held a Crypto Task Force roundtable to explore an appropriate…
Read More →In Lacey v. State Farm General Ins. Co., 2025 WL 1363069 (C.D. Cal. May 5, 2025), plaintiff submitted a filing…
Read More →Plugins are like accessories—and Coco Chanel said it best: “Before you leave the house, look in the mirror and remove…
Read More →On May 9, 2025, the US Copyright Office released a “pre-publication version” of Part 3 of its report on Copyright…
Read More →