Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Cybersecurity Trust Reality in 2026

New Sophos survey reveals only 5% of IT leaders say they fully trust their cybersecurity vendors When organizations select a cybersecurity vendor, they’re placing critical operational resilience — people, data, and revenue — into that supplier’s hands. Yet despite this reliance, most organizations lack confidence in the vendors they depend on to keep them secure, according to new Sophos research.

Axios npm package compromised to deploy malware

On March 30, 2026, a supply chain security attack targeted Axios, a widely used JavaScript HTTP client for web and Node.js applications. Third-party researchers identified that Axios versions 1.14.1 and 0.30.4 published to the npm registry were compromised following the apparent takeover of a legitimate maintainer account. An attacker published unauthorized package updates that appeared legitimate.

The High Cost of Low Trust: Our Commitment to Radical Transparency

Only 5% of organizations fully trust their cybersecurity providers. Let’s do better. In our industry, trust isn't an abstract concept. It’s the currency of cybersecurity – the foundation of every partnership we build and every protection we provide. However, a recent independent, vendor-agnostic survey of 5,000 cybersecurity decision-makers across 17 countries reveals a stark reality: we’re facing a trust crisis.

The State of Ransomware in Financial Services 2025

369 IT and cybersecurity leaders reveal the ransomware realities for financial services providers today. The report examines how the causes and consequences of ransomware attacks on financial services providers have evolved over time. This year's edition also sheds light on previously unexplored areas, including the organizational factors that left providers exposed and the human toll ransomware takes on IT and cybersecurity teams in the financial services sector.

Navigating cybersecurity with an effective SOC

Security Operations Centers (SOCs) are essential for detecting and responding to cyber threats, but building the right model isn't one-size-fits-all. With talent shortages and rising threat complexity, many organizations are rethinking how to scale security operations. This guide breaks down the pros, cons, and trade-offs of in-house, hybrid, and outsourced SOC models. Find the SOC strategy that fits your needs, risk profile, and available resources.

Where AI in the SOC is actually delivering - and where it isn't

Where AI in the SOC is actually delivering — and where it isn’t“We’ll have a generation of security professionals who can supervise AI but can’t function without it." For all the noise surrounding “agentic AI” in cybersecurity, security operations centers are still wrestling with the same fundamental questions: What does AI genuinely improve today? Where does it fall short? How can organizations tell the difference?

Incident responders, s'il vous plait: Invites lead to odd malware events

A phishing campaign targeting multiple organizations led to RMM installations – but not much else (yet). A threat actor experimenting, or an access-as-a-service attack underway? Sophos’ Managed Detection and Response (MDR) teams reported on a phishing campaign late last year that attempted to trick users into installing LogMeIn Resolve (formerly GoToResolve), a remote monitoring and management (RMM) tool, to acquire remote unattended access.

Cybersecurity for Education - Sophos Protected Classroom

Cybercriminals are targeting schools more than ever, drawn by sensitive student and staff data and the chance to disrupt learning. For educators already managing tight budgets and growing digital demands, a single breach can mean days of downtime and lasting reputational damage. Criminals are increasingly attracted by the valuable and sensitive information education establishments hold, and the opportunity to extort payments using ransomware or the threat of breach exposure.

Sophos Firewall ranked the #1 overall firewall solution in G2's Spring 2026 reports

Sophos Firewall ranked the overall firewall solution in G2’s Spring 2026 reports Why organizations are choosing Sophos Firewall to reduce exposure and strengthen resilience When organizations evaluate security products, they want real‑world proof of reliability, protection, and ease of management.

NICKEL ALLEY strategy: Fake it 'til you make it

Counter Threat Unit (CTU) researchers continue to investigate trends in Contagious Interview campaign activity conducted by NICKEL ALLEY, a threat group operating on behalf of the North Korean government. The group notoriously targets professionals in the technology sector by advertising fake job opportunities, deceiving prospective candidates through a fake job interview process, and ultimately delivering malware.

Oracle vulnerability (CVE-2026-21992) impacts core products

On March 20, 2026, Oracle disclosed a critical (CVSS score of 9.8) vulnerability (CVE-2026-21992) impacting two Oracle Fusion Middleware components: Oracle Identity Manager and Oracle Web Services Manager. An unauthenticated attacker could exploit the vulnerability to obtain network access via HTTP and remotely execute code. Critical functions of the products are exposed due to the lack of network-level authentication. As of this publication, there are no reports of active exploitation.

The global CISO landscape: A leadership gap too large to ignore

The global CISO landscape: A leadership gap too large to ignore Why the world needs scalable security leadership — and MSPs and MSSPs are key to delivery The 2026 CISO Report, published by Cybersecurity Ventures in partnership with Sophos, highlights a critical imbalance in global cybersecurity leadership. Despite decades of progress and near-universal CISO adoption in Fortune 500 and Global 2000 organizations, there are still only 35,000 CISOs worldwide serving an estimated 359 million businesses.

Sophos Protected Browser: Enforce access to critical resources

A step-by-step tutorial showing you how to use a federated identity provider (IDP) to enforce access to critical resources only through Sophos Protected Browser. The optional step to enforce the use of Protected Browser via Sophos Endpoint is also shown. Note: Microsoft Entra ID is used as the IDP in this Techvid. Ask questions and get expert answers in the Sophos Community.