Cybersecurity
Cybersecurity
Troy Hunt: Weekly Update 456
It's time to fly! It's two months to the day since we came back from the last...
Hardware Releases
Upcoming Gaming Hardware Launches in 2026 Every Gamer Should Know
Introduction
As the gaming industry evolves, PC hardware enthusiasts are in for a prosperous 2026. As always, we have...
Industry Events & Conferences
5G And Events: How It Will Shape, Change & Revolutionise The Industry
The topic of 5G and events is something we’ve tackled before. You might recall us mentioning it in...
Tech Trends & Innovations
Google will reduce battery life for some Pixel 6a phones to prevent overheating
Google's Pixel 6a has been a winner in many respects, but a new issue with the smartphone's battery...
When cybercriminals eat their own – Sophos News
At Sophos X-Ops, we often get queries from our customers asking if they’re protected against certain malware variants. At first glance, a recent question...
Why Non-Human Identity Management is the Next Cybersecurity Frontier
Modern enterprise networks are highly complex environments that rely on hundreds of apps and infrastructure services. These systems need to interact securely and efficiently...
NICKEL TAPESTRY expands fraudulent worker operations – Sophos News
With this post, the X-Ops blog is thrilled to present research from our Sophos siblings newly joining us from Secureworks, of which CTU (the...
New Mirai botnet campaign targets DVR devices
The abuse of known security flaws to deploy bots on vulnerable systems is a widely recognized problem. Many automated bots constantly search the web...
Upcoming DShield Honeypot Changes and Customizations, (Fri, Jun 6th)
There are some upcoming DShield honeypot changes that introduce some opportunities for additional customization and data analysis. For most users, no additional actions...