The cyber threat landscape is undeniably complex and dynamic. Traditional cybersecurity measures are struggling to detect and stop attacks before they can cause damage. The IBM Cost of a Data Breach Report for 2023 found that only one-third of...
Read MoreMorphisec has successfully identified and prevented a new variant of IDAT loader. This loader is used to deliver a range of malware payloads based on the attacker's assessment of the victim's system. Distinguished by its modular architecture, IDAT...
Read MoreCVE-2024-2883 is a critical vulnerability found in ANGLE, a component of Google Chrome and Microsoft Edge. The vulnerability is exploitable via crafted HTML pages, allowing remote attackers to exploit heap corruption. The potential impact is high,...
Read MoreThis blog examines the Akira Ransomware as a Service (RaaS) group, to understand their Tactics, Techniques, and Procedures (TTPs), and validate how Morphisec’s patented Anti-Ransomware solution powered by Automated Moving Target Defense (AMTD) can...
Read MoreHeap buffer overflow in WebRTC in Google Chrome prior to 120.0.6099.129 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Read MoreSecurity leaders are acutely aware of vulnerability risks. Organizations continue to allocate thousands of dollars to periodic vulnerability assessments, and thousands more to technology and resources for mitigation — yet vulnerability-based breach...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Cyber Security News (127)
- Morphisec Labs (114)
- Threat Research (69)
- Morphisec News (54)
- Automated Moving Target Defense (14)
- Defense-in-Depth (7)
- Gartner (6)
- In-Memory Attacks (6)
- Adaptive Exposure Management (5)
- Continuous Threat Exposure Management (CTEM) (4)
- Ransomware (4)
- Runtime Attacks (4)
- Advanced Threat Defense (3)
- Evasive Loader (3)
- Fileless Malware (3)
- Legacy Security (3)
- Linux Cybersecurity (3)
- Threat and Vulnerability Management (3)
- ChatGPT (2)
- Financial Cybersecurity (2)
- Patch Management (2)
- Product Blogs (2)
- Anti-tampering (1)
- Healthcare Cybersecurity (1)
- IoT Security (1)
- Microsoft (1)
- Server Security (1)