Recent Webinar: Building an Adaptive Cyber Resilient Cloud
arrow-white arrow-white Watch now
close
Posted by Brad LaPorte on October 29, 2024

The industry standard mix of cybersecurity technology and defensive measures most organizations use to form a break wall designed to detect inbound threats and neutralize them through early response. But for many companies, the break wall is...

Read More
Posted by Morphisec Team on October 24, 2024

Despite increasing investment in cybersecurity, cybercrime is surging. Every day attacks cripple healthcare providers, shut down educators, and disrupt financial/insurance services firms, manufacturing firms, law firms, and software companies to the...

Read More
Posted by Jay Kurup on October 21, 2024

In late 2023, Microsoft Windows Server 2012 and 2012 R2 reached their end of life. Microsoft is ending free updates, bug fixes, and technical support to an operating system still used in hundreds of thousands of enterprise servers.

Read More
Posted by Brad LaPorte on October 17, 2024

When it comes to the cybersecurity tech stack, many teams admittedly suffer from tech bloat. In many ways the continuous evolution of the threat landscape and an ever-growing list of unique use cases has made tech bloat inevitable. Tools...

Read More
Posted by Jay Kurup on October 15, 2024

Ransomware has become one of the most prevalent and damaging forms of cybercrime in recent years, affecting businesses, governments and individuals worldwide. The 2024 Verizon Data Breach Investigations Report highlights ransomware as one of the...

Read More
Posted by Shmuel Uzan on October 8, 2024

Recently, Morphisec Threat Labs identified and prevented multiple sophisticated Lua malware variants targeting the educational sector. These attacks capitalize on the popularity of Lua gaming engine supplements within the student gamer community.

Read More
Posted by Brad LaPorte on September 24, 2024

Artificial Intelligence (AI) has revolutionized nearly every sector, and cybersecurity is no exception. As cyber threats become increasingly sophisticated, AI is transforming how both vendors and defenders approach these evolving challenges. I...

Read More
Posted by Brad LaPorte on September 17, 2024

As cyber threats continue to evolve, it's clear that traditional, static security measures are no longer sufficient. Organizations must embrace innovative approaches to stay ahead of sophisticated attackers. 

Read More
Posted by Jay Kurup on September 10, 2024

Mandiant cybersecurity researchers recently released a blog on a memory-only dropper which uses a complex multi-stage infection process. This PowerShell-based downloader is being tracked as PEAKLIGHT. Mandiant researcher findings note that this...

Read More
Posted by Hanni Barry on September 5, 2024

In today's rapidly evolving cybersecurity landscape, effective vulnerability management is a cornerstone of maintaining a robust security posture. Yet despite investing significant resources into regular vulnerability assessments and mitigation...

Read More
Posted by Michael Gorelik on September 3, 2024

In the rapidly evolving landscape of cybersecurity threats, a new adversary has emerged, drawing inspiration from one of the internet’s most enigmatic puzzles—Cicada3301. This new threat, dubbed Cicada3301 ransomware, was identified in a Morphisec...

Read More
Posted by Jay Kurup on August 29, 2024

The evolution of cybersecurity has been a journey of increasingly sophisticated defense innovations. It began with basic anti-virus (AV) software, which relied on static analysis to identify known threats by scanning binaries and files. 

Read More
Posted by Hanni Barry on August 26, 2024

Global financial stability is facing an unprecedented threat due to the escalating frequency and sophistication of cyberattacks. According to a recent report by the International Monetary Fund (IMF), the financial sector continues to be a prime...

Read More
Posted by Brad LaPorte on August 22, 2024

Once considered a passing fad, ransomware attacks have consistently risen in frequency and complexity. New research from Cyentia confirms ransomware’s threat dominance — its findings note that ransomware accounts for 32% of all security incidents...

Read More
Posted by Brad LaPorte on August 20, 2024

Automated Moving Target Defense (AMTD) has been recognized in the Gartner Hype Cycle for Endpoint and Workspace Security, 2024 report, in its ‘on the rise’ category. Morphisec is named as a Sample Vendor in the AMTD category for the second year in a...

Read More
Posted by Arnold Osipov on August 19, 2024

Recently, Morphisec researchers discovered a vulnerability in Microsoft Outlook that can lead to remote code execution (RCE). This vulnerability, identified as CVE-2024-38021, highlights a significant security flaw within the Microsoft Outlook...

Read More
Posted by Jay Kurup on August 13, 2024

As part of our ongoing efforts to identify newer vulnerabilities in Microsoft Office applications, Morphisec researchers have discovered two additional critical vulnerabilities in the Microsoft Outlook application which were reported to Microsoft...

Read More
Posted by Arnold Osipov & Michael Gorelik on August 12, 2024

Recently, Morphisec researchers discovered a vulnerability in Microsoft Outlook, which highlights the potential for remote code execution within the context of the Outlook application. This newly identified vulnerability, CVE-2024-30103, allows...

Read More
Posted by Brad LaPorte on August 8, 2024

In the rapidly evolving landscape of cybersecurity, the Managed Detection and Response (MDR) market has undergone significant transformations. What began as a reactive approach focused on detecting and responding to threats has now matured into a...

Read More
Posted by Brad LaPorte on August 5, 2024

Cyber-attacks targeting healthcare facilities ruthlessly exploit personal, vulnerable and highly sensitive information. It’s one of the few industries where attacks can lead to life and death scenarios.

Read More