">
TechMoran
  • About Us
  • Deals
  • Jobs
  • Motoring
    • Money
  • Pitch Your Startup
  • Submit Your Post
  • Freelance Gigs
  • Travel
  • Men’s Corner
  • Dating
Wednesday, January 27, 2021
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition
No Result
View All Result
TechMoran
">
Home Tech

Sophos Boosts Endpoint Detection to Help Businesses Battle New Blended Cyberattacks

Milcah Lukhanyu by Milcah Lukhanyu
2 years ago
in Tech
11 min read
0

Sophos, a global leader in network and endpoint security, today announced Intercept X for Server with Endpoint Detection and Response (EDR). By adding EDR to Intercept X for Server, IT managers can investigate cyberattacks against servers, a sought-after target due to the high value of data stored there. Cybercriminals frequently evolve their methods and are now blending automation and human hacking skills to successfully carry out attacks on servers. This new type of blended attack combines the use of bots to identify potential victims with active adversaries making decisions about who and how to attack.

The SophosLabs Uncut article, Worms Deliver Cryptomining Malware to Web Servers, underscores how easy it is for cybercriminals to leverage bots to discover soft targets. The report explains an automated attack that can deliver a wide range of malicious code to servers that, as a class, tend to lag behind normal update cycles.

Anatomy of a Blended Cyberattack

Once the bots identify potential targets, cybercriminals use their savvy to select victims based on an organization’s scope of sensitive data or intellectual property, ability to pay a large ransom, or access to other servers and networks. The final steps are cerebral and manual: break in, evade detection and move laterally to complete the mission. This could be to quietly sneak around to steal intelligence and exit unnoticed, disable backups and encrypt servers to demand high-roller ransoms, or use servers as launch pads to attack other companies.

“Blended cyberattacks, once a page in the playbook of nation state attackers, are now becoming regular practice for everyday cybercriminals because they are profitable. The difference is that nation state attackers tend to persist inside networks for long lengths of time whereas common cybercriminals are after quick-hit money making opportunities,” said Dan Schiappa, chief product officer, Sophos. “Most malware is now automated, so it’s easy for attackers to find organizations with weak security postures, evaluate their payday potential, and use hand-to-keyboard hacking techniques to do as much damage as possible.”

READ  Alibaba's UC Browser launches in Kenya | Targets Africa's growing mobile population

Sophos explains how blended cyberattacks work in this video, Intercept X for Server with Endpoint Detection and Response (EDR).

Sophos Intercept X for Server with EDR

Related posts

Safaricom’s M-PESA Bill Manager brings digital receitps, bills and invoices to businesses & landlords

January 26, 2021
0

Stranded in Lockdown? Here Are 3 Ways You Can Make Money Via Cryptocurrencies Online

January 26, 2021
0
aimbot -8

UNDP Gifts Kenya With Robots That Will Aid In Fighting COVID-19

January 26, 2021
0

Signal Adds WhatsApp Like Features That Have Made The App More Interactive

January 26, 2021
0

With Sophos Intercept X for Server with EDR, IT managers at businesses of all sizes now have visibility across an entire estate. This allows them to proactively detect stealthy attacks, better understand the impact of a security incident and quickly visualize the full attack history.  

“When adversaries break into a network, they head straight for the server. Unfortunately, the mission critical nature of servers restrains many organizations from making changes, often significantly delaying patch deployment. Cybercriminals are counting on this window of opportunity. If organizations do fall victim to an attack, they need to know the full context of what devices and servers were hit in order to improve security as well as answer questions based on stricter regulatory laws. Knowing this information accurately the first time can help businesses resolve issues much faster and prevent them from a repeat data breach,” said Schiappa. “If regulators rely on digital forensics as evidence of lost data, then businesses can rely on the same forensics to demonstrate their data has not been stolen. Sophos Intercept X for Server with EDR provides this required insight and security intelligence.”

READ  South Africa's Knife Capital Launches Grindstone Accelerator To Build Tech Startups

Sophos Intercept X for Server with EDR expands Sophos’ offering of EDR, which was first announced for endpoints in October 2018. Sophos EDR is powered by deep learning technology for more extensive malware discovery. Sophos’ deep learning neural network is trained on hundreds of millions of samples to look for suspicious attributes of malicious code to detect never-before-seen threats. It provides broad, expert analysis of potential attacks by comparing the DNA of suspicious files against the malware samples already categorized in SophosLabs.

“Our research shows that concerns about security and skills shortages are top of mind with IT and security leadership at many organizations,” said Fernando Montenegro, senior industry analyst at 451 Research. “With cyber threats coming from multiple vectors and at a constant rate, businesses can’t afford to have a gap in their visibility. We believe that, as security teams look for opportunities to enhance their protection, bringing together EDR features and visibility across endpoints and servers is a positive step towards greater efficiency.”

With Sophos’ EDR feature, IT managers also have on-demand access to curated intelligence from SophosLabs, guided investigations into suspicious events, and recommended next steps. To maintain full visibility into the threat landscape, SophosLabs tracks, deconstructs and analyzes 400,000 unique and previously unseen malware attacks each day.

“Our customers use Sophos Intercept X with EDR for their endpoints, and the feedback we’ve had is that Sophos’ EDR is easy to implement, easy to use and easy to manage. This reduces the skills needed to manage EDR and makes our customers much more effective at their protecting servers, a critical factor considering the high rate of attacks there,” said Sam Heard, president of Data Integrity Services, a Sophos partner in Lakeland, Fla. “With EDR for servers, Sophos is building upon its industry leading Intercept X endpoint protection. Sophos is also the only vendor to bring all of its security products together on one cloud-based management platform, Sophos Central, and connect its endpoint and network protection through Synchronized Security. Adding EDR for servers is yet another key industry advancement that will protect our customers.”

Readers 861

Share

  • Click to share on Telegram (Opens in new window)
  • More
  • Click to share on Tumblr (Opens in new window)
  • Click to print (Opens in new window)
  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Pinterest (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Pocket (Opens in new window)

Like this:

Like Loading...

Related

Milcah Lukhanyu

Milcah Lukhanyu

Milcah Lukhanyu covers daily news briefs at TechMoran. She is the person who will probably read your press release and get the story out of it or totally trash it. Send tips to [email protected]

Related Posts

Tech

Safaricom’s M-PESA Bill Manager brings digital receitps, bills and invoices to businesses & landlords

January 26, 2021
0
Tech

Stranded in Lockdown? Here Are 3 Ways You Can Make Money Via Cryptocurrencies Online

January 26, 2021
0
aimbot -8
Tech

UNDP Gifts Kenya With Robots That Will Aid In Fighting COVID-19

January 26, 2021
0
Tech

Signal Adds WhatsApp Like Features That Have Made The App More Interactive

January 26, 2021
0
Toshiba
Tech

Chrome Now Helps You Change Weak Passwords

January 23, 2021
0
Tech

Top 5 Skills That Modern Software Developers Need to Have

January 22, 2021
0
Tech

What Software Developers Need to Know About Burnout

January 22, 2021
0
Tech

Which is Better, Leasing or Purchasing Farm Equipment?

January 22, 2021
0

https://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoBhttps://bit.ly/2VOxuoB
ADVERTISEMENT

Join our Mailing List

Loading

Recent Posts

Huawei Mobile to launch Huawei Y7a in Kenya early next month

January 27, 2021

Air Conditioner Maintenance Tips to Save Energy

January 27, 2021

Enjoy The Convenience of Washing & Drying With Ramtons Washer Dryer Combo 

January 27, 2021

Samsung, Safaricom partner to push Samsung Galaxy S21 pre-orders

January 26, 2021

Safaricom’s M-PESA Bill Manager brings digital receitps, bills and invoices to businesses & landlords

January 26, 2021
">
">

Follow Us

">

There are many sites out there focused on blowing off some steam, from funny entertainment to thrilling experiences like playing online, in some cases online gaming could grant you the chance to win extra money. We came across rocketpot.io while browsing for a good btc casino online and it left us a very good impression with their wide variety of games and crypto offering.

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

© 2019 Moran Media Group - All rights reserved TechMoran.

No Result
View All Result
  • Startups
  • Reviews
  • Insider
    • Obituaries
  • Business
  • Women
  • Blockchain
  • Columnists
  • Hacks & Facts
    • How To
  • Editions
    • US Edition
    • India Edition
    • MENA Edition
    • Asia Edition
    • Europe Edition
    • International Edition

© 2019 Moran Media Group - All rights reserved TechMoran.

Login to your account below

Forgotten Password? Sign Up

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.
%d bloggers like this: