<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Sophos Blogs</title>
    <link>https://www.sophos.com/en-gb/blog</link>
    <description>Latest blog posts and insights from Sophos</description>
    <language>en-gb</language>
    <atom:link href="https://www.sophos.com/en-gb/blog/feed" rel="self" type="application/rss+xml"/>
    
    <item>
      <title>QEMU abused to evade detection and enable ransomware delivery</title>
      <link>https://www.sophos.com/en-gb/blog/qemu-abused-to-evade-detection-and-enable-ransomware-delivery</link>
      <description><![CDATA[<p>The use of hidden virtual machines (VMs) enables long-term access, credential harvesting, data exfiltration, and PayoutsKing ransomware deployment</p><p><strong>Categories:</strong> Threat Research</p><p><strong>Tags:</strong> virtual machine, QEMU, PayoutsKing, GOLD ENCOUNTER, CitrixBleed2</p>]]></description>
      <pubDate>Thu, 16 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt0e1e2d411d4d672c</guid>
    </item>

    <item>
      <title>We let OpenClaw loose on an internal network. Here’s what it found</title>
      <link>https://www.sophos.com/en-gb/blog/we-let-openclaw-loose-on-an-internal-network-heres-what-it-found</link>
      <description><![CDATA[<p>Following our article on the challenges posed by agentic AI, we gave OpenClaw access to one of our legacy networks</p><p><strong>Categories:</strong> Threat Research</p><p><strong>Tags:</strong> OpenClaw, LLM, AI, penetration testing, Red Team, CISO, Sophos X-Ops</p>]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">bltb7fb3b55650cde52</guid>
    </item>

    <item>
      <title>The vulnerability flood is here. Here’s what it means – and how to prepare</title>
      <link>https://www.sophos.com/en-gb/blog/vulnerability-flood-is-here</link>
      <description><![CDATA[<p>We can&apos;t control the pace of AI-driven vulnerability discovery, but we can control how fast we respond.</p><p><strong>Categories:</strong> Sophos Insights</p><p><strong>Tags:</strong> LLM, AI, Exploit, vulnerability, Active Adversary, Pacific Rim</p>]]></description>
      <pubDate>Thu, 09 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">bltb2f3596f1b625ce7</guid>
    </item>

    <item>
      <title>Is compliance complexity outpacing IT capacity?</title>
      <link>https://www.sophos.com/en-gb/blog/is-compliance-complexity-outpacing-it-capacity</link>
      <description><![CDATA[<p>No matter the country, industry, or company size, IT and cybersecurity teams report a heavy regulatory load and worry about staying aligned with requirements</p><p><strong>Categories:</strong> Products &amp; Services</p><p><strong>Tags:</strong> CISO, Compliance</p>]]></description>
      <pubDate>Wed, 08 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt0609c49a56770a57</guid>
    </item>

    <item>
      <title>Sophos named a 2026 Gartner® Peer Insights™ Customers&apos; Choice for Managed Detection and Response</title>
      <link>https://www.sophos.com/en-gb/blog/sophos-gartner-peer-insights-mdr</link>
      <description><![CDATA[<p>Third consecutive time being named a Customers’ Choice for MDR</p><p><strong>Categories:</strong> Products &amp; Services</p><p><strong>Tags:</strong> Gartner, Gartner Peer Insights, MDR, Sophos MDR, Third-Party Reviews</p>]]></description>
      <pubDate>Fri, 03 Apr 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt04b582b253776e2c</guid>
    </item>

    <item>
      <title>The Cybersecurity Trust Reality in 2026</title>
      <link>https://www.sophos.com/en-gb/blog/the-cybersecurity-trust-reality-in-2026</link>
      <description><![CDATA[<p>New Sophos survey reveals only 5% of IT leaders say they fully trust their cybersecurity vendors</p><p><strong>Categories:</strong> Products &amp; Services, Sophos Insights</p><p><strong>Tags:</strong> Trust, Privacy, Trust Center</p>]]></description>
      <pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt2f3b396017dc65a4</guid>
    </item>

    <item>
      <title>The High Cost of Low Trust: Our Commitment to Radical Transparency</title>
      <link>https://www.sophos.com/en-gb/blog/the-high-cost-of-low-trust-our-commitment-to-radical-transparency</link>
      <description><![CDATA[<p>Only 5% of organizations fully trust their cybersecurity providers. Let’s do better.</p><p><strong>Categories:</strong> Products &amp; Services, Sophos Insights</p><p><strong>Tags:</strong> Trust, Trust Center, Privacy</p>]]></description>
      <pubDate>Tue, 31 Mar 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt002d9e8cc55cce35</guid>
    </item>

    <item>
      <title>Incident responders, s&apos;il vous plait: Invites lead to odd malware events</title>
      <link>https://www.sophos.com/en-gb/blog/incident-responders-s-il-vous-plait</link>
      <description><![CDATA[<p>A phishing campaign targeting multiple organizations led to RMM installations – but not much else (yet). A threat actor experimenting, or an access-as-a-service attack underway?</p><p><strong>Categories:</strong> Threat Research</p><p><strong>Tags:</strong> STAC6405, infostealer, RMM, Phishing</p>]]></description>
      <pubDate>Mon, 30 Mar 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blte3e0ca88a091185d</guid>
    </item>

    <item>
      <title>The global CISO landscape: A leadership gap too large to ignore</title>
      <link>https://www.sophos.com/en-gb/blog/2026-ciso-report</link>
      <description><![CDATA[<p>Why the world needs scalable security leadership — and MSPs and MSSPs are key to delivery</p><p><strong>Categories:</strong> Products &amp; Services</p><p><strong>Tags:</strong> Featured, CISO, Survey</p>]]></description>
      <pubDate>Mon, 23 Mar 2026 00:00:00 GMT</pubDate>
      <guid isPermaLink="false">blt137e21fcd51ac59e</guid>
    </item>
  </channel>
</rss>