Cyber security solutions like next generation anti-virus (NGAV), endpoint detection and response (EDR), and endpoint protection platform (EPP) face abuse, tampering, and exploitation to achieve initial access and persistence. Threat actors know it's...
Read MoreToday, threat and vulnerability management is more critical than ever, with unpatched vulnerabilities involved in 60 percent of data breaches. Vulnerability tools of all stripes abound, yet for all their features, few offer a clear path to action....
Read MoreDespite increasing investment in cybersecurity, cybercrime is surging. Every day attacks cripple healthcare providers, shut down educators, and disrupt financial/insurance services firms, manufacturing firms, law firms, and software companies to the...
Read MoreA doctor might describe the condition of cybersecurity in healthcare 2022 as "critical." In a little over two years, healthcare IT has seen a decade's worth of changes. From a security point of view, most have been for the worse.
Read MoreThe DoNot Team (a.k.a APT-C-35) are advanced persistent threat actors who’ve been active since at least 2016. They’ve targeted many attacks against individuals and organizations in South Asia. DoNot are reported to be the main developers and users...
Read MoreIn the last couple of years, security teams in large enterprises and high-profile government organizations have increasingly experienced a new form of attack. This attack leverages the supply chain of an organization’s software ecosystem (and less...
Read MoreOn the dark web, private health information (PHI) sells for up to $1,000 per record. In response to surging healthcare cyberattacks, it's now glaringly obvious that data security in healthcare needs to go in a new direction.
Read MoreIn the last few years, organizations in every sector have witnessed a clear shift in the threat landscape. Although the number and frequency of all kinds of cyberattacks increased, ransomware in particular has undergone extremely rapid evolution....
Read MoreTo help protect the public, Morphisec Labs constantly monitors, investigates, and assesses the latest threats to help organizations avoid serious consequences. In recent months, threats involving infostealers have escalated. This report analyzes six...
Read MoreShoe shops and security operation centers have something in common. One size fits all solutions are not a great idea in either area. Unfortunately for security professionals trying to secure Linux servers, purpose-built Linux solutions are...
Read MoreNot long ago, the term “Linux protection” was closer to an oxymoron than a strategy. For security teams and vendors alike, Linux systems were seen as being either immune to cyber threats or not something threat actors targeted.
Read MoreBetween staff shortages and COVID variants, healthcare providers have had plenty to worry about during the past two years. Now alongside these worries, cybersecurity issues in healthcare are also putting patient care in jeopardy. Healthcare is one...
Read MoreWith 50% more users last year than in 2020, the number of people using the community chat platform Discord is growing at a blistering pace. This has led cybercriminals to refine and expand malicious attack use cases for the platform. In this threat...
Read More"Make do and mend." If you work in IT security, this slogan, from a pamphlet issued by the British government in 1943, probably resonates. In security, constant mending—i.e. patching, is a fact of life. So what is virtual patching and why would you...
Read MoreRansomware attacks have never been more dangerous, or prolific. 2020 was described by security experts and media outlets as the "worst year ever for ransomware." Then ransomware attacks grew by 105 percent between 2020 and 2021. This cyberwar has...
Read MoreMITRE is an unbiased and respected organization that performs a valuable service to the cybersecurity community. The MITRE ATT&CK evaluation is an industry standard, and the industry can use all the help it can get to identify the tactics and...
Read MoreFor small and medium businesses (SMBs), digital transformation has been a double edged sword. Cloud technologies and IoT devices have boosted productivity during a punishing pandemic where every dollar counts. But these advances have come at a cost....
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Moving Target Defense (127)
- Cyber Security News (119)
- Morphisec Labs (107)
- Threat Post (57)
- Threat Research (55)
- Morphisec News (52)
- in-memory attacks (6)
- Defense-in-Depth (4)
- runtime attacks (4)
- Linux cyber security (3)
- advanced threat defense (3)
- patch management (2)
- threat and vulnerability management (2)
- Anti-tampering (1)
- Automated Moving Target Defense (1)
- ChatGPT (1)
- Evasive loader (1)
- Fileless malware (1)
- Gartner (1)
- Gartner Emerging Tech (1)
- Gartner endpoint protection (1)
- Healthcare cybersecurity (1)
- IoT security (1)
- Legacy security (1)
- Ransomware (1)
- Securing IoT devices (1)
- Server security (1)
- financial cybersecurity (1)