Recent Webinar: Building an Adaptive Cyber Resilient Cloud
arrow-white arrow-white Watch now
close
Posted by Shmuel Uzan on October 8, 2024

Recently, Morphisec Threat Labs identified and prevented multiple sophisticated Lua malware variants targeting the educational sector. These attacks capitalize on the popularity of Lua gaming engine supplements within the student gamer community.

Read More
Posted by Brad LaPorte on September 24, 2024

Artificial Intelligence (AI) has revolutionized nearly every sector, and cybersecurity is no exception. As cyber threats become increasingly sophisticated, AI is transforming how both vendors and defenders approach these evolving challenges. I...

Read More
Posted by Brad LaPorte on September 17, 2024

As cyber threats continue to evolve, it's clear that traditional, static security measures are no longer sufficient. Organizations must embrace innovative approaches to stay ahead of sophisticated attackers. 

Read More
Posted by Jay Kurup on September 10, 2024

Mandiant cybersecurity researchers recently released a blog on a memory-only dropper which uses a complex multi-stage infection process. This PowerShell-based downloader is being tracked as PEAKLIGHT. Mandiant researcher findings note that this...

Read More
Posted by Hanni Barry on September 5, 2024

In today's rapidly evolving cybersecurity landscape, effective vulnerability management is a cornerstone of maintaining a robust security posture. Yet despite investing significant resources into regular vulnerability assessments and mitigation...

Read More
Posted by Michael Gorelik on September 3, 2024

In the rapidly evolving landscape of cybersecurity threats, a new adversary has emerged, drawing inspiration from one of the internet’s most enigmatic puzzles—Cicada3301. This new threat, dubbed Cicada3301 ransomware, was identified in a Morphisec...

Read More
Posted by Jay Kurup on August 29, 2024

The evolution of cybersecurity has been a journey of increasingly sophisticated defense innovations. It began with basic anti-virus (AV) software, which relied on static analysis to identify known threats by scanning binaries and files. 

Read More
Posted by Hanni Barry on August 26, 2024

Global financial stability is facing an unprecedented threat due to the escalating frequency and sophistication of cyberattacks. According to a recent report by the International Monetary Fund (IMF), the financial sector continues to be a prime...

Read More
Posted by Brad LaPorte on August 22, 2024

Once considered a passing fad, ransomware attacks have consistently risen in frequency and complexity. New research from Cyentia confirms ransomware’s threat dominance — its findings note that ransomware accounts for 32% of all security incidents...

Read More
Posted by Brad LaPorte on August 20, 2024

Automated Moving Target Defense (AMTD) has been recognized in the Gartner Hype Cycle for Endpoint and Workspace Security, 2024 report, in its ‘on the rise’ category. Morphisec is named as a Sample Vendor in the AMTD category for the second year in a...

Read More
Posted by Arnold Osipov on August 19, 2024

Recently, Morphisec researchers discovered a vulnerability in Microsoft Outlook that can lead to remote code execution (RCE). This vulnerability, identified as CVE-2024-38021, highlights a significant security flaw within the Microsoft Outlook...

Read More
Posted by Jay Kurup on August 13, 2024

As part of our ongoing efforts to identify newer vulnerabilities in Microsoft Office applications, Morphisec researchers have discovered two additional critical vulnerabilities in the Microsoft Outlook application which were reported to Microsoft...

Read More
Posted by Arnold Osipov & Michael Gorelik on August 12, 2024

Recently, Morphisec researchers discovered a vulnerability in Microsoft Outlook, which highlights the potential for remote code execution within the context of the Outlook application. This newly identified vulnerability, CVE-2024-30103, allows...

Read More
Posted by Brad LaPorte on August 8, 2024

In the rapidly evolving landscape of cybersecurity, the Managed Detection and Response (MDR) market has undergone significant transformations. What began as a reactive approach focused on detecting and responding to threats has now matured into a...

Read More
Posted by Brad LaPorte on August 5, 2024

Cyber-attacks targeting healthcare facilities ruthlessly exploit personal, vulnerable and highly sensitive information. It’s one of the few industries where attacks can lead to life and death scenarios.

Read More
Posted by Brad LaPorte on July 29, 2024

The Crowdstrike and Windows outage highlighted a new reality for all companies: IT systems are critical infrastructure. 

Read More
Posted by Michael Gorelik on July 24, 2024

A recent faulty configuration file in CrowdStrike's Falcon platform caused a significant IT disruption, rendering millions of Windows machines inoperable. The result was a multi-day outage event, which affected critical sectors such as airlines,...

Read More
Posted by Brad LaPorte on July 19, 2024
A recent update from CrowdStrike caused significant issues for Windows computers, leading to crashes and the Blue Screen of Death (BSOD). This is one of the largest outages in history affected various organizations worldwide. The issue was due to a...
Read More
Posted by Brad LaPorte on July 18, 2024

When it comes to endpoint security, Microsoft Defender for Endpoint stands out as a popular choice. It's the fastest-growing endpoint protection platform, boasting over 19% market share, and for good reason — Microsoft Defender for Endpoint provides...

Read More
Posted by Brad LaPorte on July 15, 2024

The many factors that influence the threat landscape make predicting its path nearly impossible. But as security professionals, observing attack trends can help us anticipate shifts and respond from a position of strength. As a community we tend to...

Read More