Ransomware developers have powerful financial incentives to continue adding new features to their code. From developers to affiliates, these malicious pieces of software enrich countless cyber criminals at great expense to victims, and will likely...
Read MoreIs that a rat or a phoenix? Usually, the answer to such a question would be simple. However, when it comes to threat actors, nothing is ever as easy as it appears. For this reason we’ve compiled the latest news on cyber threats, new(ish) ransomware...
Read MoreCredential theft is one of the most common ways for adversaries to gain access to critical systems. Multi-factor authentication (MFA) or its cousin two-factor authentication (2FA) are two of the technologies designed to limit this particular type of...
Read MoreThis week in security has seen some new moves from the federal government on zero trust, tighter collaboration with the private tech sector, and more than a few new attacks from groups operating in China and Iran. With that said, here’s the security...
Read MoreWelcome to the Leading from Within series. Here, we showcase leaders from within Morphisec as we discuss emerging topics and trends dear to the cybersecurity community. From ransomware variants to phishing scams, from attacks on healthcare...
Read MoreWow, what a week. From new incentives to become a cyber defender to new targets for threat actors, this week had it all. We start with the $10 million dollar information bounty currently offered by the US Government and we end with the startling...
Read MoreWelcome to the latest edition of security news in review. In this biweekly roundup, we collect news on attacks and threats that may have an impact on your business. Today, we have stories on REvil encrypting hundreds of organizations at once, the...
Read MoreZero trust security has become a major topic of conversation in the cybersecurity community. With good reason too: zero trust as a cyber security methodology helps minimize the attack surface, traditionally when it comes to identity and the network,...
Read MoreThis week we have good news and bad news. On the one hand, a COO was caught and charged with potentially attacking a rival medical institution. A stolen data marketplace was shut down and bugs were found (all around). However, there has also been an...
Read MoreThis week was a doozy. Several large-scale organizations have experienced some form of cyberattack. Cloud vulnerabilities and malicious apps, masquerading as well-known services, have also taken up space in official app stores. Keep reading for a...
Read MoreThis week’s news roundup is all about data. Kicking things off is a recently announced breach at Mercari, predictions for “data poisoning” becoming a big attack vector, and the possibility of a national data breach disclosure law.
Read on for the...
Read MoreThis week, cloud security gets an upgrade, large companies take responsibility for past mistakes, and threat actors come up with admittedly innovative ways to steal your data. Keep reading to learn more about this week’s top cybersecurity news.
Read MoreIn this week’s roundup, we discover new tactics of threat actors, ongoing cyberattacks, and (surprisingly) the new depths ransomware operators will travel in order to make their victims pay. Keep reading to learn about the latest developments in...
Read MoreThis week on Security News in Review, we have coverage on the Facebook data leak, some movement from the federal government on closing a weak spot, and theories on whether IcedID could take on the role Emotet used to have.
Read MoreThis weekend on security news in review, we have some new data on firmware attacks against global enterprises, insights into how much damage ransomware has caused the healthcare industry, and the Department of Homeland Security laying out a new...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Automated Moving Target Defense (153)
- Threat Research (132)
- Cyber Security News (131)
- Morphisec Labs (121)
- Morphisec News (55)
- Defense-in-Depth (12)
- Adaptive Exposure Management (11)
- Gartner (10)
- Ransomware (10)
- Continuous Threat Exposure Management (CTEM) (8)
- In-Memory Attacks (7)
- Threat and Vulnerability Management (6)
- Advanced Threat Defense (5)
- Preemptive Security (5)
- Financial Cybersecurity (4)
- Healthcare Cybersecurity (4)
- Linux Cybersecurity (4)
- Microsoft (4)
- Runtime Attacks (4)
- ChatGPT (3)
- Evasive Loader (3)
- Fileless Malware (3)
- Legacy Security (3)
- Product Blogs (3)
- Artificial Intelligence (2)
- Patch Management (2)
- Anti-tampering (1)
- Case Study (1)
- IoT Security (1)
- Managed Service Providers (1)
- Server Security (1)