<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=885880844953016&amp;ev=PageView&amp;noscript=1">

Here’s What's Driving the Rise In Cloud Workload Cyber Threats

Why Virtual Desktop Infrastructure Is Riskier Than You Realize

Virtual Desktop Infrastructure: Crucial in a Work-From-Home World

It’s Time to Re-Evaluate Your Ransomware Prevention Strategy

Cloud Workload Security Needs a Proactive Approach to Processes and Technology

Trickbot/Emotet Delivery through Word Macro

What Is Cloud Workload Protection?

How Does Shared Responsibility Affect Cloud Security?

COVID-19 Reveals the Dirty Truth about Cybersecurity Spending

QakBot (QBot) Maldoc Campaign Introduces Two New Techniques into Its Arsenal

3 Tips for Better Virtual Desktop Infrastructure Security

Morphisec Knowledge Update: New WastedLocker Ransomware Causes Enterprise Havoc

Morphisec Special Offer: Full Best-in-Class Endpoint Protection At A Lower Price Than Your Current Antivirus

Proactive Endpoint Protection: How Morphisec Guard Secures Your Infrastructure

Counting the Cost of Endpoint Security Breaches

Virtual Desktop Security Requires More than Antivirus

Improve Threat Prevention with a Focus on Tactics, Not Techniques

How COVID-19 Has Altered the Enterprise Cyberattack Landscape

Good Cyber Hygiene Is Critical for Remote Workforces

Obfuscated VBScript Drops Zloader, Ursnif, Qakbot, Dridex

CrystalBit / Apple Double DLL Hijack

How Are VDI Security and Endpoint Security the Same?

Ursnif/Gozi Delivery - Excel Macro 4.0 Utilization Uptick & OCR Bypass

Advanced Endpoint Protection in the New COVID-19 World

The Five Hidden Risks of A Remote Workforce

Machine Learning Can’t Protect You From Fileless Attacks | NGAV

How Emerging Cyber Threats Outwit Existing Endpoint Security

What Are Healthcare's Biggest Cybersecurity Weak Spots?

Zoom Malware Can Record Meetings; Attack Simulation Shows How

Lokibot with AutoIt Obfuscator + Frenchy Shellcode

Why Remote Collaboration Applications are the New Zero Day Frontier

GuLoader: The RAT Downloader

Malware Authors Playing on COVID-19 Fears to Achieve Their Goals

Hospitals Must Focus on Ransomware Prevention in the Age of COVID-19

Parallax: The New RAT on the Block

Remote Employees Offer Different Security Challenges

Why Client-Grade Technology won't work for Cloud Workload Protection

Trickbot Delivery Method Gets a New Upgrade Focusing on Windows 10

Introducing the Morphisec Unified Threat Prevention Platform

Endpoint Security Is Harder than Ever

Trickbot Trojan Leveraging a New Windows 10 UAC Bypass

Morphisec Protects Customers Against Internet Explorer Scripting

Endpoint Detection and Response Is Not the Next Step

Are Guests Safe From a Hotel Data Breach?

Season's greetings from morphisec

Trickbot Trojan Returns in a New eCommerce Shopping Campaign

ConnectWise Control Abused Again to Deliver Zeppelin Ransomware

Retail Cybersecurity Must Be Improved This Season

Morphisec Protects You from the New PURELOCKER Ransomware

NanoCore RAT Under the Microscope

Apple Zero-Day Exploited in New BitPaymer Campaign

Protecting Your Road Warriors from Cyber Hazards

Morphisec vs. the Microsoft CTF Exploit: Twenty Year Old Design Flaw

Meet the 2019 Morphisec Women in Cybersecurity Scholarship Winners

Threat Alert: GermanWiper

POS Systems: What, Why and How

BitPaymer Ransomware Leveraging New Custom Packer Framework Against Targets Across the U.S.

Local Governments Targeted by Global Cybercrime Syndicates

introducing morphisec's 2019 Financial cyberthreat index

FIN8 is Back in Business, Targeting the Hospitality Industry

Morphisec Announces Version 3.5

A look at Hworm / Houdini AKA njRAT

Morphisec + WINDOWS Defender AV: Advanced Threat Protection Made Easy

Next Generation Protection with Microsoft Defender for Endpoint and Morphisec

Morphisec’s Q1 2019 U.S. Citizen Threat Index

Analyzing the Acronyms: Moving Target Defense vs. AV, NGAV, EDR, EPP…

Morphisec Gets Best Midmarket Software Solution Award, Among Others

introducing morphisec's 2019 Healthcare cybersecurity threat index

Inside the ASUS Supply Chain Attack

Morphisec Launch CTF Competition in Israel’s Cyber Enthusiasts Capital

Morphisec’s Women Cybersecurity Scholarship

Threat Alert: AVE Maria infostealer on the rise

New Global Cyber Attack on Point of Sale Systems

Five Questions to Ask Endpoint Security Vendors at RSAC 2019

Explore the New Morphisec

New Campaign Delivers Orcus RAT

Virtual Patching as Part of a Patch MANAGEMENT Strategy

Maximize Your Cyber Security ROI

Morphisec 3.0 - New Endpoint Threat Prevention Platform

The December 2018 Morphisec Labs Threat Report

Morphisec Compatibility Update for Windows 10 V. 1809, Office 365 32-bit

Threat Alert: Adobe Flash Zero-Day CVE-2018-15982

Morphisec Uncovers Global Pied Piper Campaign

‘TIS THE SEASON FOR CYBER ATTACKS

FIN7 Not Finished – Morphisec Spots New Campaign

How Critical Manufacturers Can Build a Better Defense Strategy

What Is the  Current Fear Threshold for Americans for State-Sponsored Cyber Attacks on the Upcoming U.S. Elections?

Healthcare Needs to Focus on Cyber Health

Cobalt Group 2.0

Morphisec Takes Moving Target Defense to the Next Level with Department of Homeland Security

Increasing Fallout from the Fallout Exploit Kit

Morphisec Gets Top Honors at the MES XCellence Awards

Morphisec’s Michael Gorelik Hosts Series of Threat Analysis Meetups in Boston Area

Ransomware Attacks: A Quantum Leap from Quantity to Quality

Four Fundamentals in Building a Security Stack

SharpShooter Pen Testing Framework Used by Attackers

Join Morphisec at Black Hat USA

GandCrab Ransomware Version 4.0/4.1

Morphisec Opens New Corporate Offices

Meet the 2018 Women in Cybersecurity Scholarship Winners

Threat Alert: MyloBot - New Highly Sophisticated Botnet

Threat Alert: Flash Vulnerability CVE-2018-5002

Introducing the First-ever Morphisec Labs Threat Report

[CRITICAL ALERT] CVE-2018-4990 Acrobat Reader DC Double-Free Vulnerability

AI Security – Who is it Really Outsmarting?

Morphisec Hits One Million Endpoint Milestone

CVE-2018-8174 Blows the VBScript Attack Door Wide Open

Case Study: Dan Hotel Group Stays Off the Breach List

New Info-Stealing Trojan Spotted in HSBC Malspam Campaign

Morphisec Honored at MMCIO Spring Forum

GDPR and Your Cybersecurity Strategy

Women Underrepresented at RSAC - Let's Do Something About It

Morphisec Joins Citrix Ready Partner Program

ESG Report Reviews Morphisec for Advanced Prevention Defense

Watering Hole Attack on Leading Hong Kong Telecom Site Exploiting Flash Flaw (CVE-2018-4878)

Threat Profile: Dofoil (Smoke Loader) Trojan with Coin-Miner

Webinar: Dynamic Endpoint Protection for Virtual Environments

Morphisec Uncovers New Attack Vector Named CIGslip That Bypasses Microsoft Code Integrity Guard (CIG)

The Lazarus Group Strikes Again - The Latest CVE-2018-4878 Attack

Flash Exploit, CVE-2018-4878, Spotted as Part of Massive Malspam Campaign

Threat Profile: GandCrab Ransomware

Series B Funding Round Validates Morphisec’s Groundbreaking Cybersecurity Technology

CVE-2018-4878: An Analysis of the Flash Player Hack

Adobe Flash Zero-Day Prevented by Morphisec (CVE-2018-4878)

Threat Profile: Microsoft Equation Editor Backdoor

System Gap Protection During Patching Gaps

Meet Up With Morphisec and Get Cyber-Ready for 2018

Meltdown and Spectre Q&A

Top Seven Cybersecurity Predictions for 2018

Meltdown and Spectre: Where the Real Risks Lie

Threat Profile: Rokrat Trojan

Best of 2017: Our Top 5 Posts of the Year

Happy Holidays and Best Wishes for 2018

Threat Profile: SIGMA Ransomware

Threat Alert: Memory Corruption Vulnerability CVE-2017-11826

How to Create a Safer Shopping Experience

Fileless Malware Attack Trend Exposed

Cybersecurity Scholarship Program Off and Running

Preventing Bad Rabbit Is Only Remarkable If It's Unremarkable

Career Path in Cybersecurity Still Steep for Women

Two KPIs Essential For Measuring Security Tools

FIN7 Dissected: Hackers Accelerate Pace of Innovation

The Question of Advanced Attack Protection - Reframed

RIG exploit kit returns, with modified pattern and free generated “freenom” domains

Morphisec Discovers CCleaner Backdoor Saving Millions of Avast Users

Case Study: Securing Advanced Manufacturing From Advanced Threats

Version 2.0 is Here!

Hospitality Industry Needs Shelter From Cyber Threats

Artificial Intelligence for Security: Real Limitations

FIN7 Takes Another Bite at the Restaurant Industry

Threat Profile: Jaff Ransomware

Ransomware - Answer with a Solid Cyber Security Strategy

Cyber Threat Trends: Spotlight on the UK

Iranian Fileless Attack Infiltrates Israeli Organizations

Building Security Resiliency Into Critical Infrastructure

Cyber Defense Reinvented - Israel Dealmakers Summit 2017

Malware Is A Symptom – Don’t Treat Symptoms

Morphisec Discovers New Fileless Attack Framework

Andromeda’s Five Star Custom Packer – Hackers’ Tactics Analyzed

RSAC 2017: Is the cybersecurity industry about keeping up with the Joneses?

New Wave of Cerber Ransomware Sweeps the Globe – Can’t Surge Past Morphisec

Ready for RSAC and a New Take on Endpoint Security?

Hedge Funds Need to Hedge Against Hackers

Meet Us at CyberTech Tel Aviv

How to Build an Economically-Driven Cyber Defense Strategy

Our Top 10 Blog Posts of 2016

Windows, Drivers and Digital Signatures

Cybersecurity Predictions for  2017 - Round 4

Happy 2017!

Cybersecurity Predictions for  2017 - Round 3

Evasive Malware Campaign with Faked HM Revenue and Customs Attachment

Cybersecurity Predictions for  2017 - Round 2

Cybersecurity Predictions for  2017

Attack Alert: Another Month, Another Hancitor Variant

Tor/FireFox Zero-Day prevented by Morphisec

Calculating the Costs of Patching

New Wave of Hancitor Comes with New Evasive Techniques

EMET Refuses to Die

Calculating Your Cyber ROI

Morphisec Wins PwC People’s Choice Award 2016

New Wave of Fileless Kovter Backdoor Trojan Attacks Via “Targeted” Macro-Based Malspam Campaign

Morphisec Prevents Major Malspam Campaign - Again

Microsoft Patch Tuesday: All or Nothing Patching

VDI  - the Good, the Bad and the Answer

The Many Faces of Ransomware

New Locky – Zepto Variant Prevented by Morphisec

Emotional Drivers Behind Prevention and Containment Cyber Strategies

New Malspam Campaign Discovered and Prevented by Morphisec

Reflections on Black Hat USA

The Future of Intrusion Detection

Black Hat Goers Pessimistic About the Cyber Security Future

Morphisec On Cyber Security

Don’t Gamble With Your Cybersecurity: Join Morphisec in Las Vegas at Black Hat 2016

Protect Your Company against Exploit Kits with Moving Target Defense

The King is Dead, Long live the King: Angler May Have Disappeared but Neutrino Quickly Fills In

Dridex is Back with a Vengeance. Adding More Evasion Techniques to its Arsenal.

How to Stack the Deck Against Attackers. Gartner Security Summit Recap.

There’s a Madness to the Method - Surreal Logic in Cybersecurity

Less is More (Dangerous): A Dissection of Fileless In-Memory Attacks

The Fall of Signature-based Endpoint Protection; the Rise of Moving Target Defense

Subscribe to our blog

Stay in the loop with industry insight, cyber security trends, and cyber attack information and company updates.

New call-to-action

Search Our Site

    Recent Posts

    Posts by Tag

    See all