Ransomware attacks have never been more dangerous, or prolific. 2020 was described by security experts and media outlets as the "worst year ever for ransomware." Then ransomware attacks grew by 105 percent between 2020 and 2021. This cyberwar has...
Read MoreA successful security breach brings with it a host of legal and financial ramifications, including cleanup costs paid to remediation vendors and possible penalties from the exfiltration of sensitive data. The rise of data protection regulations...
Read MoreEditor's Note: This blog post is courtesy of IT Central Station.
Security Operations (SecOps), never a stress-free area of business, is now struggling with additional pressures. While the threat environment has grown more serious than ever, people...
Read MoreEditor's Note: This is a guest blog from IT Central Station.
Brian Wagner, the senior network engineer at Wilson County Schools in North Carolina, needed threat prevention solutions that would help improve his overall endpoint protection process ...
Read MoreFrom the team at Morphisec to you and yours: Happy Holidays and a safe and happy new year. See you again in 2021.
Read MoreAmericans Fear of an Imminent or Elevated Cyber Threat Against the Nation Drops to 51%; But 27% of Citizens Believe There Are Lingering Effects on Cyber Defenses from the Government Shutdown
Read MoreOn April 8th, Morphisec's CTF (Capture The Flag) Competition will host 45 hand-picked finalists in Beer Sheva’s Gav Yam Negev Advanced Technologies Park.
Read MoreMichael Gorelik, Morphisec Chief Technology Officer and Head of Morphisec Labs will be hosting the first in a series of threat analysis workshops/discussions on Thursday, September 27, 2018.
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Cyber Security News (114)
- Moving Target Defense (113)
- Morphisec Labs (100)
- Threat Post (56)
- Threat Research (50)
- Morphisec News (49)
- advanced persistent threat (2)
- zero trust architecture (2)
- Mars Stealer (1)
- Microsoft Defender (1)
- NIST (1)
- Ransomware defense (1)
- SMB cybersecurity (1)
- SYK crypter (1)
- Virtual patching (1)