Credential theft is one of the most common ways for adversaries to gain access to critical systems. Multi-factor authentication (MFA) or its cousin two-factor authentication (2FA) are two of the technologies designed to limit this particular type...Read More
As a landmark piece of legislation, the General Data Protection Regulation (GDPR) was undoubtedly created with the safety and privacy of European consumers’ personal data in mind. However, while certainly designed with good intentions, the GDPR,...Read More
This week in security has seen some new moves from the federal government on zero trust, tighter collaboration with the private tech sector, and more than a few new attacks from groups operating in China and Iran. With that said, here’s the...Read More
Welcome to the Leading from Within series. Here, we showcase leaders from within Morphisec as we discuss emerging topics and trends dear to the cybersecurity community. From ransomware variants to phishing scams, from attacks on healthcare...Read More
Editor's Note: This is a guest blog from IT Central Station.
Brian Wagner, the senior network engineer at Wilson County Schools in North Carolina, needed threat prevention solutions that would help improve his overall endpoint protection process ...Read More
Wow, what a week. From new incentives to become a cyber defender to new targets for threat actors, this week had it all. We start with the $10 million dollar information bounty currently offered by the US Government and we end with the startling...Read More
Welcome to the latest edition of security news in review. In this biweekly roundup, we collect news on attacks and threats that may have an impact on your business. Today, we have stories on REvil encrypting hundreds of organizations at once, the...Read More