Recent Webinar: Building an Adaptive Cyber Resilient Cloud
arrow-white arrow-white Watch now
close
Posted by Michael Gorelik on May 10, 2016
 

In the course of our research, we constantly encounter the simple but harsh truth that malware authors can easily bypass popular security products with small variations to their code. In this technical analysis, we present the inner details of a...

Read More
Posted by Michael Gorelik on April 13, 2016

After the burst of the bug bubble, I’m left wondering who at SerNet decided the Badlock marketing campaign was a good idea and why.  It certainly was not, as claimed, to raise awareness for a critical bug that needed immediate patching.

Read More
Posted by Michael Gorelik on March 2, 2016

In Morphisec Labs, we are constantly tracking the behavior of the exploit kits that are making life easy for hackers and complicated for security managers. Since the EKs need to take advantage of whatever vulnerability they can find on an end user’s...

Read More
Posted by Michael Gorelik on February 16, 2016

Introduction

A few days ago, malware hunter @PhysicalDrive0 published a new word document sample that we were intrigued to check in Morphisec Labs.  We wanted to see if our product performs its immediate prevention objective. And it did, as expected.

Read More
Posted by Michael Gorelik on January 13, 2016

The recent discovery of vulnerabilities in antivirus software by enSilo sparked curiosity among the Morphisec Labs team. After a long deep dive our research found that the vulnerability wasn’t an unintentional flaw in the code, it was a feature!...

Read More
Posted by Michael Gorelik on November 9, 2015

Have you ever wondered what happens to zero-day exploits after their big splash on day zero? Often 0-days are developed to target a specific organization, as in this Pawn Storm-related instance reported by Trend Micro, which targeted specific people...

Read More
Posted by Michael Gorelik on October 15, 2015

After our recent blog post about an encrypted Flash exploit, we went back to analyze some more of these exploit files. We took some of the newer exploit recordings available on a malware aggregation site, and tried to decrypt them using the same...

Read More
Posted by Michael Gorelik on October 1, 2015

One of our favorite things to do is to reproduce exploits in our research labs. We do this for two main reasons: first, because we are naturally curious, and second, to constantly ensure that our solution prevents these exploits natively (spoiler:...

Read More