Calculating the Costs of Patching

Posted by Netta Schmeidler on Dec 4, 2016 2:12:02 PM

 

This is the second blog post in a series of excerpts from the ebook (download here) “Know Your Cyber Security ROI: Making the Business Case for Cyber Security.” The first post introduced the concept of cybersecurity implicit ROI and the factors that determine the expected value of your cybersecurity operations. It also outlined the three attack phases and the correlation between attack phase and organizational cost.

This post examines the first attack phase and the costs associated with precautionary measures during this phase:

Organizations employ many precautions and actions in the attempt to block cyber attacks. Such measures can require significant time and resources to implement as well as maintain. This class of tools includes endpoint security solutions such as anti-virus, protection and detection systems as well as gateway solutions.

Every enterprise includes software patching as part of its security system to some extent. Because of its widespread use and marked impact on business processes, we will examine patching as an example of direct and indirect costs to your organization.

Read More

Topics: Endpoint Security, CISO, cybersecurity

New Wave of Hancitor Comes with New Evasive Techniques

Posted by Roy Moshailov on Nov 27, 2016 2:49:08 AM

 The full report is also available as PDF. 

From November 7 – 15, 2016, Morphisec identified and monitored a new wave of sophisticated malware attacks using a modified version of the Hancitor downloader. The malware is delivered via targeted phishing emails with malicious macro-based documents attached.

Read More

Topics: Attack Analysis

EMET Refuses to Die

Posted by Netta Schmeidler on Nov 18, 2016 7:09:50 PM

 

Microsoft recently announced it would extend support for its Enhanced Mitigation Experience Toolkit (EMET) until July 31, 2018. According to Microsoft, this 18 month reprieve –  originally support was scheduled to end on January 21, 2017 – is the direct result of customer feedback.

Read More

Calculating Your Cyber ROI

Posted by Netta Schmeidler on Nov 16, 2016 6:00:01 AM

 

Executives often view cybersecurity as an expense, a necessary one perhaps, but still a burden on company finances, focus and time. Instead it should be approached as an investment – an investment in protecting an organization’s systems, resources, customers and reputation. And, like any investment, cybersecurity should be able to prove its value by delivering a solid ROI. But how do you calculate cybersecurity ROI? After all, security doesn’t create earnings.

Read More

Topics: Attacks, Endpoint Security, CISO, cybersecurity

Morphisec Wins PwC People’s Choice Award 2016

Posted by Morphisec Team on Oct 27, 2016 6:27:17 PM

 

 

Morphisec was honored to receive the PricewaterhouseCoopers People’s Choice Award at PwC Cyber Security Day 2016 in Luxembourg last week. (Read the full press release here.)

Award candidates were evaluated on value proposition, internationalization strategy, potential impact in the industry, as well as their elevator pitch performance made in front of 200 investors, corporations and industry experts.

Read More

Topics: Company, Industry News, Endpoint Security, cybersecurity

New Wave of Fileless Kovter Backdoor Trojan Attacks Via “Targeted” Macro-Based Malspam Campaign

Posted by Michael Gorelik on Oct 22, 2016 11:31:27 PM

UPDATED POST  - NOW WITH DETAILED TECHNICAL ANALYSIS!

During October 17 to 21, Morphisec identified and prevented several malicious and sophisticated macro-based documents at the site of one of our customers delivering a fileless Kovter backdoor Trojan attack. This and similar attacks illustrate the troubling trend that macro-based malspam campaigns are attacking enterprises with modified evasion techniques now on a weekly basis. With antivirus products updating their signatures within 3-7 days of the detection of an attack, the window of opportunity is big enough for cybercriminals to score.

Read More

Topics: Endpoint Security, cybersecurity, Kovter, Attack Analysis

Morphisec Prevents Major Malspam Campaign - Again

Posted by Michael Gorelik on Oct 13, 2016 11:11:24 PM

Morphisec Prevents Major Malspam campaign - Again

In our report at the beginning of September about a large-scale malspam campaign discovered and stopped by Morphisec, we pointed out the central role that malware spam plays for hackers and the difficulties signature-based and behavioral security products can have in coping with them in real-time.

During October 10-12, 2016, Morphisec stopped yet another malspam campaign that again showed an extremely low detection rate on VirusTotal.

Read More

Topics: Endpoint Security, ransomware, cybersecurity, Attack Analysis

Microsoft Patch Tuesday: All or Nothing Patching

Posted by Netta Schmeidler on Oct 12, 2016 8:09:12 AM

Microsoft released its October patching update today and, as announced, it introduces a major change that has many system administrators wondering just what to do.

Read More

Topics: Industry News, Patching, cybersecurity

VDI  - the Good, the Bad and the Answer

Posted by Netta Schmeidler on Oct 5, 2016 10:55:59 AM

A Brief History

Virtual Desktop Infrastructure (VDI) is not a new concept – in fact virtualized desktops can be traced back to the 1960s, when IBM divided up mainframes into virtual machines to allow for multiple, simultaneous users. The modern take on VDI emerged around 2007 with the Virtual Desktop Manager by VMware. Citrix entered the game in late 2008. Over the next years, VDI and grew steadily but slowly. Until recently. The emergence of cloud-hosted virtual desktop solutions has accelerated VDI adoption by enterprises and smaller organizations alike.

Read More

Topics: Moving Target Defense, Endpoint Security, cybersecurity, VDI

The Many Faces of Ransomware

Posted by Mordechai Guri on Sep 23, 2016 8:04:22 AM

Ransomware has grabbed mainstream media attention recently but it’s nothing new – in fact, its origins can be traced back to floppy disk times. Part of ransomware’s new found notoriety is certainly due to the criminals’ latest target of choice, the healthcare industry, which is considered sacrosanct to most. And ransomware’s very nature lends itself to news-worthy headlines. Unlike other types of malware which rely on stealth to infiltrate systems or quietly siphon off data, ransomware boldly declares its presence and intent, often with a clever name to go with it.

Read More

Topics: Exploits, ransomware

Check out our Attack Analyses!

Take a deep dive into technical analyses of attacks prevented by Morphisec.

Subscribe to our Blog

Happy to keep you in the loop with industry insight, cyber security trends,  and cyber attack information and company updates.

Morphisec Named a Cool Vendor 2016

Morphisec is a Gartner Cool Vendor 2016

Each year Gartner identifies new Cool Vendors it considers innovative or transformative. Morphisec is honored be to named a Cool Vendor 2016. Here's more....