Cybersecurity News, Threat Research, and more from the Team Spearheading the Evolution of Endpoint Security
Morphisec Fortifies Capabilities with Next-gen Risk-Based Vulnerability Prioritization
Automated Moving Target Defense included in the Gartner® Hype Cycle™ for Endpoint Security, 2023
Windows Server 2012 End of Life –– How do You Secure Legacy Servers?
Analysis and Prevention of the WebP (libwebp) Zero-Day Vulnerability
Threat Analysis: MGM Resorts International ALPHV/Blackcat/Scattered Spider Ransomware Attack
Chae$ 4: New Chaes Malware Variant Targeting Financial and Logistics Customers
Hedging Against Cyber Risk: The AMTD Edge for Investment Firms
Best Practices for Building Defense-in-Depth Layers
Outsmarting Generative-AI Attacks: The Power of Automated Moving Target Defense
Automated Moving Target Defense is the Future of Cyber—Gartner
Attacks Against OT & Industrial Organizations Are on the Rise
GuLoader Campaign Targets Law Firms in the US
How to Protect Against the MOVEit Transfer Exploit
Endpoint Security Best Practice: Using AMTD to Stop Unknown and Undetectable Attacks Missed by NGAV, EPP and Endpoint Detection and Response Solutions
Why EDR Is Not Enough to Prevent Ransomware [Infographic]
What Makes Invalid Printer Loader so Stealthy?
Can You Secure Legacy Windows Systems?
Turn Microsoft Defender into an Unbeatable Security Solution
Fileless Malware Will Beat Your EDR
How SYS01 Stealer Will Get Your Sensitive Facebook Info
The World's Top Cybersecurity Conferences
Don’t Sleep on the New ProxyShellMiner Campaign
Will ChatGPT Create Super Malware?
How Secure are Your Legacy Systems?
New Babuk Ransomware Found in Major Attack
Moving Target Defense is “Transformative” Technology—Gartner
The Ultimate List of Cyber Security Terms
Servers Aren’t as Secure as You Think
Why Advanced Threats Are Winning
Can Banks Keep Winning Against Advanced Cyberattacks?
How Can We Secure the IoT?
Why Your Endpoints Need Robust Defense-in-Depth Too
Watch Out for the New NFT-001
Is Your Cyber Security Tamper-Proof?
How Do You Prioritize What to Patch?
Why Should You Care About In-Memory Attacks?
Most Important Healthcare Cyber Threats for 2022
Top Linux Insights From Gartner's Market Guide for CWPP
APT-C-35 Gets a New Upgrade
How Do You Stop Supply Chain Attacks?
Healthcare Data Needs to Become Safer
How to Resolve the Ransomware Security Gap
Your Guide to Top Infostealers in 2022
Top Ransomware Insights From SANS Report
Don’t Secure Linux Servers With Windows Solutions
If They Can Hold Costa Rica to Ransom, They Can do it to You
Secure the New Attack Frontier—Linux Servers
How To Save Healthcare From Ransomware
New SYK Crypter Distributed Via Discord
Your Guide to Virtual Patching
Stop Ransomware With Microsoft Defender and Morphisec
Don’t Take MITRE ATT&CK Results as Gospel
How SMBs Can Stop Their Next Big Cyberattack
New Core Impact Backdoor Delivered Via VMWare Vulnerability
How to Nail Your NIST Cybersecurity Audit
Biden's New Cybersecurity Regulations: Are You Compliant?
The Cyber Threat Landscape for 2022 Darkens
New Analysis: The CaddyWiper Malware Attacking Ukraine
New Wave of Remcos RAT Phishing Campaign
Exclusive Threat Research: Mars (Stealer) Attacks!
New JSSLoader Trojan Delivered Through XLL Files
Stop Ransomware and Other Advanced Threats With Moving Target Defense
NFT Buyers Beware: Journey of a Crypto Scammer and How to Stop Them
Log4j Exploit Hits Again: Vulnerable Unifi Network Application (Ubiquiti) at Risk
New Threat Campaign Identified: AsyncRAT Introduces a New Delivery Technique
Moving Target Defense Recognized as Emerging Technology for Application Security by Gartner
Log4j Exploit Hits Again: Vulnerable VMWare Horizon Servers at Risk
How to Stop Ransomware: See Breach Prevention in Action vs. the Cobalt Strike Backdoor
Protecting Against the Log4j (Log4Shell) Vulnerability
Why AV and EDR are Failing and How to Better Secure your Company
Babadeda Crypter targeting crypto, NFT, and DeFi communities
The Notorious Emotet Is Back: What Organizations Need to Know
10 Tips To Boost Microsoft Defender AV Security
DECAF Ransomware: A New Golang Threat Makes Its Appearance
Windows Defender Is an Underutilized Endpoint Security Resource
Explosive New MirrorBlast Campaign Targets Financial Companies
Stop Ransomware and Zero-Day Attacks With Breach Prevention
Unwanted Gift: Ransomware, Supply Chain Attacks, and How to Prevent Them
New Jupyter Evasive Delivery through MSI Installer
Triple Extortion Ransomware: A New Challenge For Defenders
Move Away from “Assume Breach” to Improve Prevention
ProxyShell Exchange Exploitation Now Leads To An Increasing Amount Of Cobaltstrike Backdoors
Blocking Attacks with the Morphisec Breach Prevention Platform
Security News in Review: Are REvil and DarkSide Rebranding?
How Does MFA Fit Into a Zero Trust Endpoint Security Framework?
Is GDPR Making Ransomware Worse?
Security News in Review: Zero Trust, The Government, and You
Cyber Diplomacy: Examining the Nation-State Threat to European Businesses
Leading From Within: Netta Schmeidler, VP of Product
Improving Efficiency and Results in Threat Prevention with Morphisec Guard
Ransomware gangs least million ! | Morphisec
Real-Time Prevention of the Kaseya VSA Supply Chain REvil Ransomware Attack
Security News in Review: REvil Launches Supply Chain Ransomware Attack
Cyber Insurance May Be Making Ransomware Worse, Here's Why
Why Lean Security Teams Should Deploy A Zero Trust Defensive Endpoint Strategy
Security News in Review: Avaddon Ransomware Closes Down; CLOP Gang Members Arrested
Ransomware Is Devastating European Healthcare Providers. Here's Why
Security News In Review: REvil Attacks Nuclear Contractor Sol Oriens
The Growing Business Cost Of Healthcare Cybercrime
Security News in Review: Bugs, Trains, and Private Banks
Google PPC Ads Deliver Redline, Taurus, and mini-Redline Infostealers
Security News in Review: SolarWinds Threat Group Launches New Phishing Campaign
Security News In Review: Data Breaches, Data Poison, and Big Data
The Top Three Weaknesses in Healthcare Cybersecurity
Biden Administration Aims to Disrupt Ransomware Gangs
AHK RAT Loader Used in Unique Delivery Campaigns
Three Trends Making Ransomware Attacks More Dangerous
Security News In Review: PyInstaller, Cloud Frameworks, and Scripps
Revealing the Snip3 Crypter, a Highly Evasive RAT Loader
Security News in Review: Emotet Uninstalled Worldwide; Babuk “Goes Dark”
The Life-Threatening Rise of Ransomware in Healthcare
Security News In Review: Ryuk Ransomware Gets a Makeover
Why Ransomware Is Making Our Healthcare Worse
Are Banks Spending Their Cybersecurity Budgets in the Right Place?
Security News In Review: Could IcedID Be the New Emotet?
Behind the Headlines: Why Ransomware Will Be One of 2020’s Most Infamous Legacies
Security News in Review: Google’s Project Zero Shuts Down Counterterrorist Hacking Team; Enterprises See Rise in Firmware Attacks
The “Fair” Upgrade Variant of Phobos Ransomware
How Lean Security Teams Can Overcome the Cybersecurity Spending Paradox
Security News in Review: REvil Attacks Laptop Maker Acer; Black Kingdom Ransomware Targets Unpatched Exchange Servers
How Ransomware Techniques Have Changed
Are Threat Actors Winning the Cybersecurity Arms Race?
Tracking HCrypt: An Active Crypter as a Service
Security News in Review: Microsoft Exchange Server Hack “Doubling” Every Two Hours; Linux Foundation Creates New Software Signing Service
How to Protect Yourself From the Microsoft Exchange Vulnerabilities
MineBridge RAT on the Rise With a Sophisticated Delivery Mechanism
Security News in Review: Ryuk Ransomware Develops Self-Replication Capabilities
Why Less Can Be More When It Comes to Cybersecurity
Security News in Review: Google Funding Security Development for Linux Kernel
Egregor Ransomware Adopting New Techniques
Security News in Review: Microsoft Patches Windows Zero-Day; Brazilian Utilities Hit by Ransomware
Long Live, Osiris; Banking Trojan Targets German IP Addresses
CinaRAT Resurfaces With New Evasive Techniques
Security News in Review: Emotet Botnet Taken Down; Trickbot Makes a Return
How State and Local Governments Can Reduce Cybersecurity Risk Without Spending Money
Security News in Review: Belgian Hospital Forced to Redirect Patients
How COVID-19 Has Changed Cybersecurity for Government Departments
Security News In Review: Third SolarWinds Malware Strain
OS-Native Endpoint Security Outpaces Third-Party Tools
The Evolution of the FIN7 JSSLoader
Happy Holidays from Morphisec
Cybersecurity Evolves Beyond Antivirus With Morphisec Guard 5.0
Why Higher Education Is a Prime Target for Cybercriminals
Busting Cloud Security Myths
Happy Thanksgiving From Morphisec
Protecting Virtual Desktops Is Critical for Remote Employees
How Hackers Compromise Virtual Desktop Infrastructure
The Introduction of the Jupyter InfoStealer/Backdoor
Agent Tesla: A Day in a Life of IR
What Is Proactive Cyber Defense?
Here’s What's Driving the Rise In Cloud Workload Cyber Threats
Why Virtual Desktop Infrastructure Is Riskier Than You Realize
Virtual Desktop Infrastructure: Crucial in a Work-From-Home World
It’s Time to Re-Evaluate Your Ransomware Prevention Strategy
Proactive Cloud Workload Security Strategy
Trickbot and Emotet Delivery through Word Macro
What Is Cloud Workload Security?
How Does Shared Responsibility Affect Cloud Security?
COVID-19 Reveals the Dirty Truth about Cybersecurity Spending
QakBot (QBot) Maldoc Campaign Introduces Two New Techniques into Its Arsenal
3 Tips for Better Virtual Desktop Infrastructure Security
New WastedLocker Ransomware Causes Enterprise Havoc
Best-in-Class Endpoint Protection At A Lower Price Than Your Antivirus
Proactive Endpoint Protection: Morphisec Guard Secures Your Company
Counting the Cost of Endpoint Security Breaches
Virtual Desktop Security Requires More than Antivirus
Improve Cyber Threat Prevention Focusing on Tactics, Not Techniques
How COVID-19 Has Altered the Enterprise Cyberattack Landscape
Good Cyber Hygiene Is Critical for Remote Workforces
Obfuscated VBScript Drops Zloader, Ursnif, Qakbot, Dridex
CrystalBit / Apple Double DLL Hijack
How Are VDI Security and Endpoint Security the Same?
Ursnif/Gozi Delivery - Excel Macro 4.0 Utilization Uptick & OCR Bypass
Advanced Endpoint Protection in the New COVID-19 World
The Five Hidden Risks of A Remote Workforce
Machine Learning Can’t Protect You From Fileless Attacks | NGAV
How Emerging Cyber Threats Outwit Existing Endpoint Security
What Are Healthcare's Biggest Cybersecurity Weak Spots?
Zoom Malware Can Record Meetings; Attack Simulation Shows How
Lokibot with Autoit Obfuscated Frenchy Shellcode
Why Remote Collaboration Applications are the New Zero Day Frontier
GuLoader: The RAT Downloader
Malware Authors Playing on COVID-19 Fears to Achieve Their Goals
Hospitals Must Focus on COVID-19 Ransomware Prevention
Parallax: The New RAT on the Block
Remote Employees Offer Different Security Challenges
Why Client-Grade Technology won't work for Cloud Workload Protection
Trickbot Delivery Method Gets a New Upgrade Focusing on Windows 10
Introducing the Morphisec Unified Threat Prevention Platform
Endpoint Security Is Harder than Ever
Trickbot Trojan Leveraging a New Windows 10 UAC Bypass
Morphisec Protects Customers Against Internet Explorer Scripting
Endpoint Detection and Response Is Not the Next Step
Are Guests Safe From a Hotel Data Breach?
Season's greetings from morphisec
Trickbot Trojan Returns in a New eCommerce Shopping Campaign
ConnectWise Control Abused Again to Deliver Zeppelin Ransomware
Retail Cybersecurity Must Be Improved This Season
Morphisec Protects You from the New PURELOCKER Ransomware
NanoCore RAT Under the Microscope
Stay in the loop with industry insight, cyber security trends, and cyber attack information and company updates.