Recent Webinar: Building an Adaptive Cyber Resilient Cloud
arrow-white arrow-white Watch now
close
Posted by Ido Ikar on December 19, 2024

In an era where cyber threats are growing in both volume and sophistication, risk management has become a cornerstone of effective organizational defense. Risk management involves identifying, assessing, and prioritizing potential threats, enabling...

Read More
Posted by Brad LaPorte on December 19, 2024

Microsoft’s decision to end support for Windows 10, its most popular operating system, marks a pivotal moment for businesses relying on this aging platform. As of October 14, 2025, this change will leave organizations with critical decisions about...

Read More
Posted by Morphisec Team on December 19, 2024

BOSTON, USA and BEER-SHEVA, Israel & STOCKHOLM, Sweden, December 13, 2024 /PRNewswire-PRWeb/ -- Morphisec, the world’s leading provider of prevention-first cybersecurity software, today announced a new collaboration with Atea Sweden, the...

Read More
Posted by Nadav Lorber on December 16, 2024

The evolution of fake update campaigns has advanced significantly with the emergence of CoinLurker, a sophisticated stealer designed to exfiltrate data while evading detection. Written in Go, CoinLurker employs cutting-edge obfuscation and...

Read More
Posted by Brad LaPorte on December 11, 2024

A new U.S. administration often represents more than just a shift in political leadership—it can be a pivotal turning point for rapidly evolving areas like cybersecurity. With each change of the guard, priorities are redefined, budgets are reshaped,...

Read More
Posted by Brad LaPorte on December 6, 2024

Fileless malware attacks are a malicious code execution technique that works completely within process memory. In a fileless attack, no files are dropped onto a hard drive. With no artifacts on the hard drive to detect, these attacks easily evade...

Read More
Posted by Brad LaPorte on December 5, 2024

The cybersecurity landscape continues to evolve, and with it, the need for advanced strategies to combat sophisticated threats. Enter Preemptive Cyber Defense—an innovative approach that’s rapidly gaining traction among organizations looking to...

Read More
Posted by Brad LaPorte on December 3, 2024

How do you steal something that doesn’t exist? That’s the thinking behind the widespread fallacy that virtual desktop infrastructure (VDI) is more secure than physical desktops.

Read More
Posted by Brad LaPorte on November 25, 2024

The cybersecurity landscape continues to evolve at an unprecedented pace, with 2025 poised to bring even greater complexity and urgency to digital defense strategies. The rapid weaponization of AI technologies is transforming the threat environment,...

Read More
Posted by Michael Gorelik on November 21, 2024

NTLM is like that stubborn relic of the past that just won’t go away – a decades-old authentication protocol, seemingly deprecated but still lurking in the shadows of every Windows environment.

Read More
Posted by Morphisec Team on November 13, 2024

Houston Eye Associates, the largest provider of ophthalmological and optometric care in Texas, has built a strong reputation over its 50 years of operation. As the organization has grown, so too has its commitment to maintaining a robust...

Read More
Posted by Brad LaPorte on November 11, 2024

Sophisticated attack techniques are increasingly bypassing traditional detection-based cybersecurity solutions. In 2023 Gartner® published a report highlighting Automated Moving Target Defense (AMTD) as “an emerging game-changing technology for...

Read More
Posted by Brad LaPorte on November 7, 2024

In recent months AI innovators have rolled out both exciting and concerning AI capabilities. Early this year Microsoft Copilot released new capabilities that while helpful for workflow optimization, heightened the risk of sensitive data exposure and...

Read More
Posted by Brad LaPorte on October 29, 2024

The industry standard mix of cybersecurity technology and defensive measures most organizations use to form a break wall designed to detect inbound threats and neutralize them through early response. But for many companies, the break wall is...

Read More
Posted by Morphisec Team on October 24, 2024

Despite increasing investment in cybersecurity, cybercrime is surging. Every day attacks cripple healthcare providers, shut down educators, and disrupt financial/insurance services firms, manufacturing firms, law firms, and software companies to the...

Read More
Posted by Jay Kurup on October 21, 2024

In late 2023, Microsoft Windows Server 2012 and 2012 R2 reached their end of life. Microsoft is ending free updates, bug fixes, and technical support to an operating system still used in hundreds of thousands of enterprise servers.

Read More
Posted by Brad LaPorte on October 17, 2024

When it comes to the cybersecurity tech stack, many teams admittedly suffer from tech bloat. In many ways the continuous evolution of the threat landscape and an ever-growing list of unique use cases has made tech bloat inevitable. Tools...

Read More
Posted by Jay Kurup on October 15, 2024

Ransomware has become one of the most prevalent and damaging forms of cybercrime in recent years, affecting businesses, governments and individuals worldwide. The 2024 Verizon Data Breach Investigations Report highlights ransomware as one of the...

Read More
Posted by Shmuel Uzan on October 8, 2024

Recently, Morphisec Threat Labs identified and prevented multiple sophisticated Lua malware variants targeting the educational sector. These attacks capitalize on the popularity of Lua gaming engine supplements within the student gamer community.

Read More
Posted by Brad LaPorte on September 24, 2024

Artificial Intelligence (AI) has revolutionized nearly every sector, and cybersecurity is no exception. As cyber threats become increasingly sophisticated, AI is transforming how both vendors and defenders approach these evolving challenges. I...

Read More