Close Menu
Edu Expertise Hub
    Facebook X (Twitter) Instagram
    Tuesday, September 2
    • About us
    • Contact
    • Submit Coupon
    Facebook X (Twitter) Instagram YouTube
    Edu Expertise Hub
    • Home
    • Udemy Coupons
    • Best Online Courses and Software Tools
      • Business & Investment
      • Computers & Internet
      • eBusiness and eMarketing
    • Reviews
    • Jobs
    • Latest News
    • Blog
    • Videos
    Edu Expertise Hub
    Home » Latest News » Black Hat USA: Halcyon and Sophos tag-team ransomware fightback
    Latest News

    Black Hat USA: Halcyon and Sophos tag-team ransomware fightback

    TeamBy TeamAugust 5, 2025No Comments4 Mins Read1 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Black Hat USA: Halcyon and Sophos tag-team ransomware fightback
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Cyber protection specialists Halcyon and Sophos have teamed up to develop a new threat intelligence sharing joint venture that will see the two companies swap data on critical metrics such as indicators of compromise (IoCs), known adversary behaviours, and attack patterns.

    Announced at the annual Black Hat USA event in Las Vegas, the partnership will see two of the most experienced teams working today to address the ransomware threat pool their resources in the service of helping speed up detection, enhance protection, and improve response capabilities.

    “Ransomware tools and tactics are evolving constantly, and the best defense is timely, relevant intelligence that enables defenders to act quickly and with confidence,” said Simon Reed, chief research and scientific officer at Sophos.

    “By sharing insights with Halcyon, we’re improving signal fidelity and accelerating detection across our systems, which strengthens protection for all the organisations we serve.”

    Halcyon CEO and co-founder Jon Miller added: “Halcyon is honored to partner with Sophos. Over the last four years, based on our telemetry, Sophos has time and time again proven to be one of the most effective endpoint security platforms we have encountered, reliably performing and disrupting attackers at a level that simply outperforms the majority of the players in the next-generation antivirus and endpoint detection and response (EDR) space.

    “Their dedication to innovate and roll out industry-leading and unique features continues to put their customers at an everyday advantage over the most sophisticated attacks affecting enterprises today.”

    Expanding operations

    The tie-up follows Halycon’s establishment of a community-centric Ransomware Research Centre – as well as Sophos’ recent acquisition of its own threat hunting capabilities through its purchase of Secureworks.

    From a technological perspective, the duo said the partnership will better inform both party’s solutions, including Sophos Endpoint, Managed Detection and Response (MDR) and XDR, and Halcyon’s Anti-Ransomware Platform.

    More broadly, Sophos said the collaboration would enhance its own strategy to expand the reach and speed of its threat intel response through partnerships. Its X-Ops cross-functional unit will be working closely with Halcyon’s research and engineering team to share ransomware insights across various attack surfaces, and turn these into operational benefits.

    No fiddling please

    As a sidenote, Halcyon and Sophos are also planning to implement mutual anti-tampering protections in their platforms that enable both parties to monitor and safeguard each other’s agents when active in customer environments.

    The logic behind this is to ensure that joint customers – where they exist – not only benefit from added resilience and reduce the risk of ransomware interfering with their defences, but also preserve, and even enhance, the integrity of their wider cyber protection strategies.

    Malicious quartile

    Meanwhile, Halcyon this week released its quarterly Malicious Quartile ransomware report covering the second calendar quarter to the end of June 2025.

    The report explores several trends in the ransomware ecosystem, notably the increasing profile of the Akira cyber crime crew, which has become a leading actor thanks to its high operational tempo, adaptive nature, and strategic targeting of victims. Also on the rise is the increasingly disciplined and ‘mature’ SafePay gang, which made headlines in the IT channel in July after an audacious attack on the systems of sector mainstay, tech distributor Ingram Micro.

    Halcyon also found that the so-called Bring-Your-Own-Vulnerable-Driver (BYOVD) technique – whereby ransomware gangs introduce their own legitimate, signed drivers with known vulnerabilities into target systems in order to achieve unauthorised kernel-level access – is now becoming a key attack vector.

    And it highlighted a broader trend – observed by others over the past year and continuing to gain in scale – of ransomware gangs bypassing encryption lockers and moving to a pure data theft and extortion model.

    Such attacks leave IT systems relatively intact and require less technical work on the part of the cyber criminals, but for victims this hardly counts as a blessing.

    This post is exclusively published on eduexpertisehub.com

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Team

      Related Posts

      Teachers Learn the Art of Teaching Civics in a Hot-Button Age

      September 2, 2025

      5 ways to infuse AI into your classroom this school year

      September 1, 2025

      AI supports care of Palestinian refugees in Lebanon hospital

      September 1, 2025

      What Stanford Learned By Crowdsourcing AI Solutions for Students With Disabilities

      August 31, 2025

      3 steps to build belonging in the classroom

      August 31, 2025

      ICO publishes summary of police facial recognition audit

      August 30, 2025
      Courses and Software Tools

      Extreme Privacy: What It Takes to Disappear

      August 24, 202466 Views

      Modern C++ Programming Cookbook: Master Modern C++ with comprehensive solutions for C++23 and all previous standards

      September 18, 202429 Views

      Meebook E-Reader M7 | 6.8′ Eink Carta Screen | 300PPI Smart Light | Android 11 | Ouad Core Processor | Out Speaker | Support Google Play Store | 3GB+32GB Storage | Micro-SD Slot | Gray

      August 19, 202423 Views

      Coders at Work: Reflections on the Craft of Programming

      April 19, 202518 Views

      HR from the Outside In: Six Competencies for the Future of Human Resources

      May 20, 202517 Views
      Reviews

      Guide to customer Due Diligence in Financial Institutions | Udemy Coupons 2025

      September 2, 2025

      Campaign Content Specialist, Americas

      September 2, 2025

      AML Enforcement in Cryptocurrency and Digital currency | Udemy Coupons 2025

      September 2, 2025

      Senior Application Developer

      September 2, 2025

      Infinite Education: The Four-Step Strategy for Leading Change in the Age of Artificial Intelligence (LeadershipGoals Series)

      September 2, 2025
      Stay In Touch
      • Facebook
      • YouTube
      • TikTok
      • WhatsApp
      • Twitter
      • Instagram
      Latest News

      Teachers Learn the Art of Teaching Civics in a Hot-Button Age

      September 2, 2025

      5 ways to infuse AI into your classroom this school year

      September 1, 2025

      AI supports care of Palestinian refugees in Lebanon hospital

      September 1, 2025

      What Stanford Learned By Crowdsourcing AI Solutions for Students With Disabilities

      August 31, 2025

      3 steps to build belonging in the classroom

      August 31, 2025
      Latest Videos

      Cyber security insights #15/200 by white fortress academy #ethicalhacking

      September 1, 2025

      The HIGHEST PAYING Finance Job AI Can’t Replace!

      August 31, 2025

      www.onlinetrainings.xyz Start Digital Marketing Career #careerindigitalmarketing #digitalmarketing

      August 30, 2025

      Salary range for Cyber Security (Tamil) | cyber security salary

      August 27, 2025

      Elevate Your Career with Digital Marketing by Prayug!

      August 26, 2025
      Latest Jobs

      Campaign Content Specialist, Americas

      September 2, 2025

      Senior Application Developer

      September 2, 2025

      TikTok Shop – Data Scientist – Measurement

      September 2, 2025

      Electrical Reliability Engineer – Brunswick

      September 2, 2025

      Registered Nurse Cath Lab Prep and Recovery PRN

      September 1, 2025
      Legal
      • Home
      • Privacy Policy
      • Cookie Policy
      • Terms and Conditions
      • Disclaimer
      • Affiliate Disclosure
      • Amazon Affiliate Disclaimer
      Latest Udemy Coupons

      Advanced Program in Human Resources Management | Udemy Coupons 2025

      April 5, 202535 Views

      Mastering Maxon Cinema 4D 2024: Complete Tutorial Series | Udemy Coupons 2025

      August 22, 202435 Views

      Diploma in Aviation, Airlines, Air Transportation & Airports | Udemy Coupons 2025

      March 21, 202530 Views

      Time Management and Timeboxing in Business, Projects, Agile | Udemy Coupons 2025

      April 2, 202522 Views

      Python Development & Data Science: Variables and Data Types | Udemy Coupons 2025

      May 24, 202521 Views
      Blog

      Finding Purpose in Life –

      August 31, 2025

      How Helya Mohammadian Is Leading the Charge for Accessible Intimates with Slick Chicks –

      August 30, 2025

      Here is MsCareerGirl’s compiled, vetted list of all the major career and job websites you should strongly consider registering for, browsing listings and posting your resume.

      August 29, 2025

      Women Entrepreneurs; DNA or Destiny? –

      August 28, 2025

      How To Answer “What Makes You Unique?” In A Job Interview

      August 23, 2025
      Facebook X (Twitter) Instagram Pinterest YouTube Dribbble
      © 2025 All rights reserved!

      Type above and press Enter to search. Press Esc to cancel.

      We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
      .
      SettingsAccept
      Privacy & Cookies Policy

      Privacy Overview

      This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
      Necessary
      Always Enabled
      Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
      Non-necessary
      Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
      SAVE & ACCEPT