<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=885880844953016&amp;ev=PageView&amp;noscript=1">

Leading From Within: Netta Schmeidler, VP of Product

Improving Efficiency and Results in Threat Prevention with Morphisec Guard

$10 Million US Dollars, Missing Ransomware Gangs, and so much more!

Real-Time Prevention of the Kaseya VSA Supply Chain REvil Ransomware Attack

Security News in Review: REvil Launches Supply Chain Ransomware Attack

Cyber Insurance May Be Making Ransomware Worse, Here's Why

Why Lean Security Teams Should Deploy A Zero Trust Defensive Endpoint Strategy

Security News in Review: Avaddon Ransomware Closes Down; CLOP Gang Members Arrested

Ransomware Is Devastating European Healthcare Providers. Here's Why

Security News In Review: REvil Attacks Nuclear Contractor Sol Oriens

The Growing Business Cost Of Healthcare Cybercrime

Security News in Review: Bugs, Trains, and Private Banks

Google PPC Ads Deliver Redline, Taurus, and mini-Redline Infostealers

Security News in Review: SolarWinds Threat Group Launches New Phishing Campaign

Security News In Review: Data Breaches, Data Poison, and Big Data

The Top Three Weaknesses in Healthcare Cybersecurity

Security News in Review: Biden Administration Aims to Disrupt Ransomware Gangs

AHK RAT Loader Used in Unique Delivery Campaigns

Three Trends Making Ransomware Attacks More Dangerous

Security News In Review: PyInstaller, Cloud Frameworks, and Scripps

Revealing the Snip3 Crypter, a Highly Evasive RAT Loader

Security News in Review: Emotet Uninstalled Worldwide; Babuk “Goes Dark”

The Life-Threatening Rise of Ransomware in Healthcare

Security News In Review: Ryuk Ransomware Gets a Makeover

Why Ransomware Is Making Our Healthcare Worse

Are Banks Spending Their Cybersecurity Budgets in the Right Place?

Security News In Review: Could IcedID Be the New Emotet?

Behind the Headlines: Why Ransomware Will Be One of 2020’s Most Infamous Legacies

Security News in Review: Google’s Project Zero Shuts Down Counterterrorist Hacking Team; Enterprises See Rise in Firmware Attacks

The “Fair” Upgrade Variant of Phobos Ransomware

How Lean Security Teams Can Overcome the Cybersecurity Spending Paradox

Security News in Review: REvil Attacks Laptop Maker Acer; Black Kingdom Ransomware Targets Unpatched Exchange Servers

How Ransomware Techniques Have Changed

Are Threat Actors Winning the Cybersecurity Arms Race?

Tracking HCrypt: An Active Crypter as a Service

Security News in Review: Microsoft Exchange Server Hack “Doubling” Every Two Hours; Linux Foundation Creates New Software Signing Service

How to Protect Yourself From the Microsoft Exchange Vulnerabilities

MineBridge RAT Is on the Rise, With a Sophisticated Delivery Mechanism

Security News in Review: Ryuk Ransomware Develops Self-Replication Capabilities

Why Less Can Be More When It Comes to Cybersecurity

Security News in Review: Google Funding Security Development for Linux Kernel

Windows Defender Is an Underutilized Endpoint Security Resource

Egregor Ransomware Adopting New Techniques

Security News in Review: Microsoft Patches Windows Zero-Day; Brazilian Utilities Hit by Ransomware

Long Live, Osiris; Banking Trojan Targets German IP Addresses

CinaRAT Resurfaces With New Evasive Tactics and Techniques

Security News in Review: Emotet Botnet Taken Down; Trickbot Makes a Return

How State and Local Governments Can Reduce Cybersecurity Risk Without Spending Money

Security News in Review: Belgian Hospital Forced to Redirect Patients; Ransomware Accounts for 81% of Financially Motivated Attacks

How COVID-19 Has Changed Cybersecurity for Government Departments

Security News In Review: Third SolarWinds Malware Strain, Microsoft Fixes Defender Zero-Day

OS-Native Endpoint Security Outpaces Third-Party Tools

The Evolution of the FIN7 JSSLoader

Happy Holidays from Morphisec

Cybersecurity Evolves Beyond Antivirus With Morphisec Guard 5.0

Why Higher Education Is a Prime Target for Cybercriminals

Busting Cloud Security Myths

Happy Thanksgiving From Morphisec

Protecting Virtual Desktops Is Critical for Remote Employees

How Hackers Compromise Virtual Desktop Infrastructure

The Introduction of the Jupyter InfoStealer/Backdoor

Agent Tesla: A Day in a Life of IR

What Is Proactive Cyber Defense?

Here’s What's Driving the Rise In Cloud Workload Cyber Threats

Why Virtual Desktop Infrastructure Is Riskier Than You Realize

Virtual Desktop Infrastructure: Crucial in a Work-From-Home World

It’s Time to Re-Evaluate Your Ransomware Prevention Strategy

Cloud Workload Security Needs a Proactive Approach to Processes and Technology

Trickbot and Emotet Delivery through Word Macro

What Is Cloud Workload Security?

How Does Shared Responsibility Affect Cloud Security?

COVID-19 Reveals the Dirty Truth about Cybersecurity Spending

QakBot (QBot) Maldoc Campaign Introduces Two New Techniques into Its Arsenal

3 Tips for Better Virtual Desktop Infrastructure Security

Morphisec Knowledge Update: New WastedLocker Ransomware Causes Enterprise Havoc

Morphisec Special Offer: Full Best-in-Class Endpoint Protection At A Lower Price Than Your Current Antivirus

Proactive Endpoint Protection: How Morphisec Guard Secures Your Infrastructure

Counting the Cost of Endpoint Security Breaches

Virtual Desktop Security Requires More than Antivirus

Improve Threat Prevention with a Focus on Tactics, Not Techniques

How COVID-19 Has Altered the Enterprise Cyberattack Landscape

Good Cyber Hygiene Is Critical for Remote Workforces

Obfuscated VBScript Drops Zloader, Ursnif, Qakbot, Dridex

CrystalBit / Apple Double DLL Hijack

How Are VDI Security and Endpoint Security the Same?

Ursnif/Gozi Delivery - Excel Macro 4.0 Utilization Uptick & OCR Bypass

Advanced Endpoint Protection in the New COVID-19 World

The Five Hidden Risks of A Remote Workforce

Machine Learning Can’t Protect You From Fileless Attacks | NGAV

How Emerging Cyber Threats Outwit Existing Endpoint Security

What Are Healthcare's Biggest Cybersecurity Weak Spots?

Zoom Malware Can Record Meetings; Attack Simulation Shows How

Lokibot with Autoit Obfuscated Frenchy Shellcode

Why Remote Collaboration Applications are the New Zero Day Frontier

GuLoader: The RAT Downloader

Malware Authors Playing on COVID-19 Fears to Achieve Their Goals

Hospitals Must Focus on COVID-19 Ransomware Prevention

Parallax: The New RAT on the Block

Remote Employees Offer Different Security Challenges

Why Client-Grade Technology won't work for Cloud Workload Protection

Trickbot Delivery Method Gets a New Upgrade Focusing on Windows 10

Introducing the Morphisec Unified Threat Prevention Platform

Endpoint Security Is Harder than Ever

Trickbot Trojan Leveraging a New Windows 10 UAC Bypass

Morphisec Protects Customers Against Internet Explorer Scripting

Endpoint Detection and Response Is Not the Next Step

Are Guests Safe From a Hotel Data Breach?

Season's greetings from morphisec

Trickbot Trojan Returns in a New eCommerce Shopping Campaign

ConnectWise Control Abused Again to Deliver Zeppelin Ransomware

Retail Cybersecurity Must Be Improved This Season

Morphisec Protects You from the New PURELOCKER Ransomware

NanoCore RAT Under the Microscope

Apple Zero-Day Exploited in New BitPaymer Campaign

Protecting Your Road Warriors from Cyber Hazards

Morphisec vs. the Microsoft CTF Exploit: Twenty Year Old Design Flaw

Meet the 2019 Morphisec Women in Cybersecurity Scholarship Winners

Threat Alert: GermanWiper

POS Systems: What, Why and How

BitPaymer Ransomware Leveraging New Custom Packer Framework Against Targets Across the U.S.

Local Governments Targeted by Global Cybercrime Syndicates

introducing morphisec's 2019 Financial cyberthreat index

FIN8 is Back in Business, Targeting the Hospitality Industry

Announcing Morphisec Version 3.5

A look at Hworm / Houdini AKA njRAT

Morphisec + WINDOWS Defender AV: Advanced Threat Protection Made Easy

Next Generation Protection with Microsoft Defender for Endpoint and Morphisec

Morphisec’s Q1 2019 U.S. Citizen Threat Index

Cybersecurity Acronyms: Moving Target Defense vs. AV, NGAV, EDR, EPP

Morphisec Gets Best Midmarket Software Solution Award, Among Others

introducing morphisec's 2019 Healthcare cybersecurity threat index

Inside the ASUS Supply Chain Attack

Morphisec Launch CTF Competition in Israel’s Cyber Enthusiasts Capital

Morphisec’s Women Cybersecurity Scholarship

Threat Alert: AVE Maria infostealer on the rise

New Global Cyber Attack on Point of Sale Systems

Five Questions to Ask Endpoint Security Vendors at RSAC 2019

Explore the New Morphisec

New Campaign Delivers Orcus RAT

Virtual Patching as Part of a Patch MANAGEMENT Strategy

Maximize Your Cyber Security ROI

Morphisec 3.0 - New Endpoint Threat Prevention Platform

The December 2018 Morphisec Labs Threat Report

Morphisec Compatibility Update for Windows 10 V. 1809, Office 365 32-bit

Threat Alert: Adobe Flash Zero-Day CVE-2018-15982

Morphisec Uncovers Global Pied Piper Campaign

‘TIS THE SEASON FOR CYBER ATTACKS

FIN7 Not Finished – Morphisec Spots New Campaign

How Critical Manufacturers Can Build a Better Defense Strategy

What Is the Current Fear Threshold for Americans for State-Sponsored Cyber Attacks on the Upcoming U.S. Elections?

Healthcare Needs to Focus on Cyber Health

Cobalt Group 2.0

Morphisec Takes Moving Target Defense to the Next Level with Department of Homeland Security

Increasing Fallout from the Fallout Exploit Kit

Morphisec Gets Top Honors at the MES XCellence Awards

Morphisec’s Michael Gorelik Hosts Series of Threat Analysis Meetups in Boston Area

Ransomware Attacks: A Quantum Leap from Quantity to Quality

Four Fundamentals in Building a Security Stack

SharpShooter Pen Testing Framework Used by Attackers

Join Morphisec at Black Hat USA

GandCrab Ransomware Version 4.0/4.1

Morphisec Opens New Corporate Offices

Meet the 2018 Women in Cybersecurity Scholarship Winners

Threat Alert: MyloBot - New Highly Sophisticated Botnet

Threat Alert: Flash Vulnerability CVE-2018-5002

Introducing the First-ever Morphisec Labs Threat Report

[CRITICAL ALERT] CVE-2018-4990 Acrobat Reader DC Double-Free Vulnerability

AI Security – Who is it Really Outsmarting?

Morphisec Hits One Million Endpoint Milestone

CVE-2018-8174 Blows the VBScript Attack Door Wide Open

Case Study: Dan Hotel Group Stays Off the Breach List

New Info-Stealing Trojan Spotted in HSBC Malspam Campaign

Morphisec Honored at MMCIO Spring Forum

GDPR and Your Cybersecurity Strategy

Women Underrepresented at RSAC - Let's Do Something About It

Morphisec Joins Citrix Ready Partner Program

ESG Report Reviews Morphisec for Advanced Prevention Defense

Watering Hole Attack on Leading Hong Kong Telecom Site Exploiting Flash Flaw (CVE-2018-4878)

Threat Profile: Dofoil (Smoke Loader) Trojan with Coin-Miner

Webinar: Dynamic Endpoint Protection for Virtual Environments

Security Flaw in Microsoft Code Integrity Guard (CIG)

The Lazarus Group Strikes Again - The Latest CVE-2018-4878 Attack

Flash Exploit, CVE-2018-4878, Spotted as Part of Massive Malspam Campaign

Threat Profile: GandCrab Ransomware

Series B Funding Round Validates Morphisec’s Groundbreaking Cybersecurity Technology

CVE-2018-4878: An Analysis of the Flash Player Hack

Adobe Flash Zero-Day Prevented by Morphisec (CVE-2018-4878)

Threat Profile: Microsoft Equation Editor Backdoor

System Gap Protection During Patching Gaps

Meet Up With Morphisec and Get Cyber-Ready for 2018

Meltdown and Spectre Q&A

Top Seven Cybersecurity Predictions for 2018

Meltdown and Spectre: Where the Real Risks Lie

Threat Profile: Rokrat Trojan

Best of 2017: Our Top 5 Posts of the Year

Happy Holidays and Best Wishes for 2018

Threat Profile: SIGMA Ransomware

Threat Alert: Memory Corruption Vulnerability CVE-2017-11826

How to Create a Safer Shopping Experience

Fileless Malware Attack Trend Exposed

Subscribe to our blog

Stay in the loop with industry insight, cyber security trends, and cyber attack information and company updates.

New call-to-action

Search Our Site

    Recent Posts

    Posts by Tag

    See all