How to Build an Economically-Driven Cyber Defense Strategy

Posted by Ronen Yehoshua on Jan 27, 2017 1:07:55 AM

Today, a few hackers may be ideologically motivated, but the majority of attacks are financially-driven crimes. This is seen most clearly in the rise of ransomware; no mystery, just pure and simple extortion. And consider the latest victim of choice, the healthcare industry, sacrosanct in most people’s eyes but merely a lucrative, vulnerable target to cybercriminals. As such, cybercrime follows the economic rules of any business – reward must outweigh costs – and should be confronted on those terms.

Read More

Topics: Cyber Attacks, Endpoint Security, CISO, Cyber Security

Cybersecurity Predictions for  2017 - Round 4

Posted by Morphisec Team on Jan 2, 2017 7:47:41 AM

Welcome to 2017!  What should we expect in cybersecurity in 2017? Our final post of cybersecurity predictions is from Adrian Asher, CISO for the London Stock Exchange Group and Morphisec Advisory Board member. He looks at upcoming developments in several key cybersecurity areas and offers some suggestions for moving forward.

Read More

Topics: Cyber Attacks, Endpoint Security, Cyber Security, Cyber Security Predictions 2017

Calculating the Costs of Patching

Posted by Netta Schmeidler on Dec 4, 2016 2:12:02 PM

 

This is the second blog post in a series of excerpts from the ebook (download here) “Know Your Cyber Security ROI: Making the Business Case for Cyber Security.” The first post introduced the concept of cybersecurity implicit ROI and the factors that determine the expected value of your cybersecurity operations. It also outlined the three attack phases and the correlation between attack phase and organizational cost.

This post examines the first attack phase and the costs associated with precautionary measures during this phase:

Organizations employ many precautions and actions in the attempt to block cyber attacks. Such measures can require significant time and resources to implement as well as maintain. This class of tools includes endpoint security solutions such as anti-virus, protection and detection systems as well as gateway solutions.

Every enterprise includes software patching as part of its security system to some extent. Because of its widespread use and marked impact on business processes, we will examine patching as an example of direct and indirect costs to your organization.

Read More

Topics: Endpoint Security, CISO, Cyber Security

Calculating Your Cyber ROI

Posted by Netta Schmeidler on Nov 16, 2016 6:00:01 AM

 

Executives often view cybersecurity as an expense, a necessary one perhaps, but still a burden on company finances, focus and time. Instead it should be approached as an investment – an investment in protecting an organization’s systems, resources, customers and reputation. And, like any investment, cybersecurity should be able to prove its value by delivering a solid ROI. But how do you calculate cybersecurity ROI? After all, security doesn’t create earnings.

Read More

Topics: Cyber Attacks, Endpoint Security, CISO, Cyber Security

Morphisec Wins PwC People’s Choice Award 2016

Posted by Morphisec Team on Oct 27, 2016 6:27:17 PM

 

 

Morphisec was honored to receive the PricewaterhouseCoopers People’s Choice Award at PwC Cyber Security Day 2016 in Luxembourg last week. (Read the full press release here.)

Award candidates were evaluated on value proposition, internationalization strategy, potential impact in the industry, as well as their elevator pitch performance made in front of 200 investors, corporations and industry experts.

Read More

Topics: Company News, Industry News, Endpoint Security, Cyber Security

New Wave of Fileless Kovter Backdoor Trojan Attacks Via “Targeted” Macro-Based Malspam Campaign

Posted by Michael Gorelik on Oct 22, 2016 11:31:27 PM

UPDATED POST  - NOW WITH DETAILED TECHNICAL ANALYSIS!

During October 17 to 21, Morphisec identified and prevented several malicious and sophisticated macro-based documents at the site of one of our customers delivering a fileless Kovter backdoor Trojan attack. This and similar attacks illustrate the troubling trend that macro-based malspam campaigns are attacking enterprises with modified evasion techniques now on a weekly basis. With antivirus products updating their signatures within 3-7 days of the detection of an attack, the window of opportunity is big enough for cybercriminals to score.

Read More

Topics: Endpoint Security, Cyber Security, Kovter, Attack Analysis

Morphisec Prevents Major Malspam Campaign - Again

Posted by Michael Gorelik on Oct 13, 2016 11:11:24 PM

Morphisec Prevents Major Malspam campaign - Again

In our report at the beginning of September about a large-scale malspam campaign discovered and stopped by Morphisec, we pointed out the central role that malware spam plays for hackers and the difficulties signature-based and behavioral security products can have in coping with them in real-time.

During October 10-12, 2016, Morphisec stopped yet another malspam campaign that again showed an extremely low detection rate on VirusTotal.

Read More

Topics: Endpoint Security, Ransomware, Cyber Security, Attack Analysis

VDI  - the Good, the Bad and the Answer

Posted by Netta Schmeidler on Oct 5, 2016 10:55:59 AM

A Brief History

Virtual Desktop Infrastructure (VDI) is not a new concept – in fact virtualized desktops can be traced back to the 1960s, when IBM divided up mainframes into virtual machines to allow for multiple, simultaneous users. The modern take on VDI emerged around 2007 with the Virtual Desktop Manager by VMware. Citrix entered the game in late 2008. Over the next years, VDI and grew steadily but slowly. Until recently. The emergence of cloud-hosted virtual desktop solutions has accelerated VDI adoption by enterprises and smaller organizations alike.

Read More

Topics: Moving Target Defense, Endpoint Security, Cyber Security, VDI

New Locky – Zepto Variant Prevented by Morphisec

Posted by Michael Gorelik on Sep 16, 2016 8:45:28 PM

New Locky – Zepto variant prevented by Morphisec! Ransomware with modified Eval mechanism evades all other security solutions.

Since Locky’s discovery in February 2016, it has emerged as one of the most prevalent and devastating ransomware threats of 2016. Over the last two months, ransomware in general has evolved greatly in delivery technique complexity, with Locky among the most insidious. 

In particular, Locky moved to the Zepto variant, executing from dll and not an executable, started using quant loader, and added more evasion techniques to its arsenal. 

Read More

Topics: Endpoint Security, Ransomware, Cyber Security, Attack Analysis

Emotional Drivers Behind Prevention, Detection, and Containment Cyber Strategies

Posted by Dudu Mimran on Sep 14, 2016 9:05:25 PM

It may sound odd, but cybersecurity has a huge emotional component. Unlike other industries that are driven by optimization and financial gains, cybersecurity has all the makings of a Hollywood movie—good guys, bad guys, nation-states attacking other nation states, and entire global IT systems at risk. Unfortunately for most victims of a cyber threat or breach, the effects are all too real and don't disappear when the music stops and the lights come on.

Read More

Topics: Endpoint Security, Cyber Security

Check out our Attack Analyses!

Take a deep dive into technical analyses of attacks prevented by Morphisec.

Subscribe to our Blog

Happy to keep you in the loop with industry insight, cyber security trends,  and cyber attack information and company updates.

Morphisec Named a Cool Vendor 2016

Morphisec is a Gartner Cool Vendor 2016

Each year Gartner identifies new Cool Vendors it considers innovative or transformative. Morphisec is honored be to named a Cool Vendor 2016. Here's more....