<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Sophos Blogs</title>
    <link>https://www.sophos.com/en-us/blog</link>
    <description>Latest blog posts and insights from Sophos</description>
    <language>en-us</language>
    <atom:link href="https://www.sophos.com/en-us/blog/feed" rel="self" type="application/rss+xml"/>
    
    <item>
      <title>Microsoft addresses 163 CVEs, 88 advisories for April Patch Tuesday</title>
      <link>https://www.sophos.com/en-us/blog/april-2026-microsoft-patch-tuesday</link>
      <description><![CDATA[<p>Following a long-established pattern, the fourth month of the year is one of the cruelest</p><p><strong>Categories:</strong> X-ops, Threat Research</p><p><strong>Tags:</strong> Patch Tuesday</p>]]></description>
      <pubDate>Fri, 17 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt8c8269f0f36d9a78</guid>
    </item>

    <item>
      <title>QEMU abused to evade detection and enable ransomware delivery</title>
      <link>https://www.sophos.com/en-us/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery</link>
      <description><![CDATA[<p>The use of hidden virtual machines (VMs) enables long-term access, credential harvesting, data exfiltration, and PayoutsKing ransomware deployment</p><p><strong>Categories:</strong> Threat Research</p><p><strong>Tags:</strong> virtual machine, QEMU, PayoutsKing, GOLD ENCOUNTER, CitrixBleed2</p>]]></description>
      <pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt0e1e2d411d4d672c</guid>
    </item>

    <item>
      <title>Secure by Design: Building cybersecurity into the foundation</title>
      <link>https://www.sophos.com/en-us/blog/building-cybersecurity-into-the-foundation</link>
      <description><![CDATA[<p>An explainer of why this philosophy matters and how it reduces attack surface from the inside</p><p><strong>Categories:</strong> Sophos Insights, Products &amp; Services</p><p><strong>Tags:</strong> Secure by Design, Thought Leadership</p>]]></description>
      <pubDate>Wed, 15 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt703810e529791e33</guid>
    </item>

    <item>
      <title>We let OpenClaw loose on an internal network. Here’s what it found</title>
      <link>https://www.sophos.com/en-us/blog/we-let-openclaw-loose-on-an-internal-network-heres-what-it-found</link>
      <description><![CDATA[<p>Following our article on the challenges posed by agentic AI, we gave OpenClaw access to one of our legacy networks</p><p><strong>Categories:</strong> Threat Research</p><p><strong>Tags:</strong> OpenClaw, LLM, AI, penetration testing, Red Team, CISO, Sophos X-Ops</p>]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">bltb7fb3b55650cde52</guid>
    </item>

    <item>
      <title>The vulnerability flood is here. Here’s what it means – and how to prepare</title>
      <link>https://www.sophos.com/en-us/blog/vulnerability-flood-is-here</link>
      <description><![CDATA[<p>We can&apos;t control the pace of AI-driven vulnerability discovery, but we can control how fast we respond.</p><p><strong>Categories:</strong> Sophos Insights</p><p><strong>Tags:</strong> LLM, AI, Exploit, vulnerability, Active Adversary, Pacific Rim</p>]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">bltb2f3596f1b625ce7</guid>
    </item>

    <item>
      <title>Adobe Reader zero-day vulnerability in active exploitation</title>
      <link>https://www.sophos.com/en-us/blog/adobe-reader-zero-day-vulnerability-in-active-exploitation</link>
      <description><![CDATA[<p><strong>Categories:</strong> Threat Research</p><p><strong>Tags:</strong> advisory, vulnerability, Adobe Reader</p>]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">bltf5d876929c0ae5e8</guid>
    </item>

    <item>
      <title>Is compliance complexity outpacing IT capacity?</title>
      <link>https://www.sophos.com/en-us/blog/is-compliance-complexity-outpacing-it-capacity</link>
      <description><![CDATA[<p>No matter the country, industry, or company size, IT and cybersecurity teams report a heavy regulatory load and worry about staying aligned with requirements</p><p><strong>Categories:</strong> Products &amp; Services</p><p><strong>Tags:</strong> CISO, Compliance</p>]]></description>
      <pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt0609c49a56770a57</guid>
    </item>

    <item>
      <title>Sophos named a 2026 Gartner® Peer Insights™ Customers&apos; Choice for Managed Detection and Response</title>
      <link>https://www.sophos.com/en-us/blog/sophos-gartner-peer-insights-mdr</link>
      <description><![CDATA[<p>Third consecutive time being named a Customers’ Choice for MDR</p><p><strong>Categories:</strong> Products &amp; Services</p><p><strong>Tags:</strong> Gartner, Gartner Peer Insights, MDR, Sophos MDR, Third-Party Reviews</p>]]></description>
      <pubDate>Fri, 03 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt04b582b253776e2c</guid>
    </item>

    <item>
      <title>Amazon GuardDuty enhances detection efficacy with Sophos threat intelligence</title>
      <link>https://www.sophos.com/en-us/blog/sophos-amazon-guardduty</link>
      <description><![CDATA[<p>Amazon has integrated Sophos threat intelligence into Amazon GuardDuty, expanding the breadth and accuracy of malicious threat detection for customers running workloads on Amazon Web Services (AWS).</p><p><strong>Categories:</strong> Products &amp; Services</p><p><strong>Tags:</strong> AWS, Sophos Intelix, amazon, Amazon GuardDuty, Sophos OEM</p>]]></description>
      <pubDate>Thu, 02 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt91e5d2c9b52d416d</guid>
    </item>
  </channel>
</rss>