In an era where cyber threats are growing in both volume and sophistication, risk management has become a cornerstone of effective organizational defense. Risk management involves identifying, assessing, and prioritizing potential threats, enabling...
Read MoreMicrosoft’s decision to end support for Windows 10, its most popular operating system, marks a pivotal moment for businesses relying on this aging platform. As of October 14, 2025, this change will leave organizations with critical decisions about...
Read MoreThe evolution of fake update campaigns has advanced significantly with the emergence of CoinLurker, a sophisticated stealer designed to exfiltrate data while evading detection. Written in Go, CoinLurker employs cutting-edge obfuscation and...
Read MoreA new U.S. administration often represents more than just a shift in political leadership—it can be a pivotal turning point for rapidly evolving areas like cybersecurity. With each change of the guard, priorities are redefined, budgets are reshaped,...
Read MoreFileless malware attacks are a malicious code execution technique that works completely within process memory. In a fileless attack, no files are dropped onto a hard drive. With no artifacts on the hard drive to detect, these attacks easily evade...
Read MoreThe cybersecurity landscape continues to evolve, and with it, the need for advanced strategies to combat sophisticated threats. Enter Preemptive Cyber Defense—an innovative approach that’s rapidly gaining traction among organizations looking to...
Read MoreHow do you steal something that doesn’t exist? That’s the thinking behind the widespread fallacy that virtual desktop infrastructure (VDI) is more secure than physical desktops.
Read MoreThe cybersecurity landscape continues to evolve at an unprecedented pace, with 2025 poised to bring even greater complexity and urgency to digital defense strategies. The rapid weaponization of AI technologies is transforming the threat environment,...
Read MoreNTLM is like that stubborn relic of the past that just won’t go away – a decades-old authentication protocol, seemingly deprecated but still lurking in the shadows of every Windows environment.
Read MoreHouston Eye Associates, the largest provider of ophthalmological and optometric care in Texas, has built a strong reputation over its 50 years of operation. As the organization has grown, so too has its commitment to maintaining a robust...
Read MoreSophisticated attack techniques are increasingly bypassing traditional detection-based cybersecurity solutions. In 2023 Gartner® published a report highlighting Automated Moving Target Defense (AMTD) as “an emerging game-changing technology for...
Read MoreIn recent months AI innovators have rolled out both exciting and concerning AI capabilities. Early this year Microsoft Copilot released new capabilities that while helpful for workflow optimization, heightened the risk of sensitive data exposure and...
Read MoreThe industry standard mix of cybersecurity technology and defensive measures most organizations use to form a break wall designed to detect inbound threats and neutralize them through early response. But for many companies, the break wall is...
Read MoreDespite increasing investment in cybersecurity, cybercrime is surging. Every day attacks cripple healthcare providers, shut down educators, and disrupt financial/insurance services firms, manufacturing firms, law firms, and software companies to the...
Read MoreIn late 2023, Microsoft Windows Server 2012 and 2012 R2 reached their end of life. Microsoft is ending free updates, bug fixes, and technical support to an operating system still used in hundreds of thousands of enterprise servers.
Read MoreWhen it comes to the cybersecurity tech stack, many teams admittedly suffer from tech bloat. In many ways the continuous evolution of the threat landscape and an ever-growing list of unique use cases has made tech bloat inevitable. Tools...
Read MoreRansomware has become one of the most prevalent and damaging forms of cybercrime in recent years, affecting businesses, governments and individuals worldwide. The 2024 Verizon Data Breach Investigations Report highlights ransomware as one of the...
Read MoreRecently, Morphisec Threat Labs identified and prevented multiple sophisticated Lua malware variants targeting the educational sector. These attacks capitalize on the popularity of Lua gaming engine supplements within the student gamer community.
Read MoreArtificial Intelligence (AI) has revolutionized nearly every sector, and cybersecurity is no exception. As cyber threats become increasingly sophisticated, AI is transforming how both vendors and defenders approach these evolving challenges. I...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Automated Moving Target Defense (157)
- Threat Research (135)
- Cyber Security News (132)
- Morphisec Labs (127)
- Morphisec News (54)
- Adaptive Exposure Management (14)
- Defense-in-Depth (13)
- Ransomware (12)
- Preemptive Security (11)
- Gartner (10)
- Continuous Threat Exposure Management (CTEM) (9)
- Microsoft (8)
- In-Memory Attacks (7)
- Healthcare Cybersecurity (6)
- Advanced Threat Defense (5)
- Financial Cybersecurity (5)
- Legacy Security (5)
- Artificial Intelligence (4)
- Linux Cybersecurity (4)
- Fileless Malware (3)
- Threat and Vulnerability Management (2)
- Managed Service Providers (1)