With attacks increasing by 140 percent between 2018 and 2019, the threat from ransomware was growing long before the COVID-19 pandemic began. Last year, however, thanks to a perfect storm of unfortunate circumstances, the trend line for ransomware...
Read MoreOver 30 years ago, a disgruntled researcher unleashed the first noted ransomware virus, the “Aids Trojan.” Distributed on 20,000 floppy disks marked “AIDS Information — Introductory Diskettes'' using hijacked mail subscriber lists to the World...
Read MoreEver since the Morris Worm infected 10 percent of internet-connected computers in 1988, endpoint security has become a critical asset for organizations and endpoints themselves a top target for threat actors. However, in recent years, the arms race...
Read MoreWhen it comes to cybersecurity, more investment doesn't necessarily mean more protection. Even though the cybersecurity market grew by over 10 percent annually before 2020, last year still saw a record amount of damage done by data breaches. While...
Read MoreAs the fallout from this past December's SolarWinds cyberattack settles, it is clear that the hack didn't just compromise federal organizations. The SolarWinds attack now appears to have infected government networks from federal departments all the...
Read MoreBefore COVID-19 started making headlines earlier this year, government departments might have been considered unlikely candidates for making large scale remote working a success. However, with service levels maintained across the public sector...
Read MoreFor the first two decades of the internet age, from the early 1990s to the 2010s, high-quality antivirus software that blocked the most malware came at an appropriate premium. After all, the endpoint was—and still is—of the primary attack vectors...
Read MoreAlthough far from new in technological terms, the ubiquity of public and hybrid cloud use is a relatively recent phenomenon. Driven in part by the current COVID-19 pandemic, it would be difficult to find an organization that isn't relying on a...
Read MoreHow do you steal something that doesn’t exist? That’s the thinking behind the widespread fallacy that virtual desktop infrastructure (VDI) is more secure than physical desktops.
Read MoreAvailable anytime and capable of being run from anywhere, cloud computing provides a perfect solution to operational challenges posed by the COVID-19 pandemic. With public and hybrid cloud use rising across every sector, dramatically increased...
Read MoreThe coronavirus pandemic has forced companies to experiment with remote work in ways they never had before. For many, working from home was the only viable option for weeks or months due to mandatory shutdown orders and grave public health concerns....
Read MoreThe recent leap towards cloud computing has fast-forwarded digital transformation for countless organizations. What there hasn’t been, however, is a corresponding improvement in the ability of organizations to secure the cloud. In fact, as more...
Read MoreCloud migration continues at a brisk pace. As many as 94% of enterprises now use the cloud, and data suggests that by the end of 2020, only 27% of workloads will happen on-premises. For everything from data storage to critical applications, the...
Read MoreThe recent rise in remote working has up-ended the corporate IT landscape. In a matter of days, remote working went from a nice-to-have perk to necessity for millions of companies globally as countries continue to battle the COVID-19 pandemic. . To...
Read MoreThe term “new normal” means different things to different people. For some, the term is synonymous with a return to the office (just with a few tweaks), while others think that co-located teams are gone for good. The reality is probably somewhere in...
Read MoreIn the ongoing war over cybersecurity, endpoints seemed like settled territory. After years of surrounding these vulnerable vectors with defensive technologies and company-wide IT hygiene best practices, it became easy to assume the endpoints were...
Read MoreGoogle, SpaceX, and even NASA, recently banning employee use of Zoom as they shift to work-from-home workforces in response to COVID-19 have shined a spotlight on the widely popular video conferencing tool’s security flaws. While “ZoomBombing”...
Read MoreWe’re in the middle of a shift between on-premises server workloads and cloud workloads. The shift started around 10 years ago and will likely continue for the next two decades. After the past decade of cloud adoption, according to 451 Research,...
Read MoreAntivirus protection is a baseline cost of doing business for the modern organization. At first, companies and governments only needed signature-based antivirus that tracked known malware. As fileless malware and exploits accelerated, next-gen...
Read MoreLast week, Intezer and IBM X-Force released new research identifying a new form of ransomware, which they named PureLocker. Written in PureBasic and designed to attack servers, this damaging new malware has been described as Malware-as-a-Service in...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Automated Moving Target Defense (152)
- Cyber Security News (131)
- Threat Research (131)
- Morphisec Labs (120)
- Morphisec News (55)
- Defense-in-Depth (12)
- Gartner (10)
- Adaptive Exposure Management (9)
- Ransomware (9)
- Continuous Threat Exposure Management (CTEM) (8)
- In-Memory Attacks (7)
- Threat and Vulnerability Management (5)
- Advanced Threat Defense (4)
- Microsoft (4)
- Runtime Attacks (4)
- ChatGPT (3)
- Evasive Loader (3)
- Fileless Malware (3)
- Financial Cybersecurity (3)
- Legacy Security (3)
- Linux Cybersecurity (3)
- Product Blogs (3)
- Artificial Intelligence (2)
- Healthcare Cybersecurity (2)
- Patch Management (2)
- Anti-tampering (1)
- IoT Security (1)
- Managed Service Providers (1)
- Preemptive Security (1)
- Server Security (1)