Recent Webinar: Building an Adaptive Cyber Resilient Cloud
arrow-white arrow-white Watch now
close
Posted by Roy Moshailov on November 26, 2016

 The full report is also available as PDF. 

From November 7 – 15, 2016, Morphisec identified and monitored a new wave of sophisticated malware attacks using a modified version of the Hancitor downloader. The malware is delivered via targeted...

Read More
Posted by Netta Schmeidler on November 18, 2016

Microsoft recently announced it would extend support for its Enhanced Mitigation Experience Toolkit (EMET) until July 31, 2018. According to Microsoft, this 18 month reprieve – originally support was scheduled to end on January 21, 2017 – is the...

Read More
Posted by Netta Schmeidler on November 15, 2016

Executives often view cybersecurity as an expense, a necessary one perhaps, but still a burden on company finances, focus and time. Instead it should be approached as an investment – an investment in protecting an organization’s systems,...

Read More
Posted by Morphisec Team on October 27, 2016

Morphisec was honored to receive the PricewaterhouseCoopers People’s Choice Award at PwC Cyber Security Day 2016 in Luxembourg last week. (Read the full press release here.)

Award candidates were evaluated on value proposition, internationalization...

Read More
Posted by Michael Gorelik on October 22, 2016

UPDATED POST  - NOW WITH DETAILED TECHNICAL ANALYSIS!

During October 17 to 21, Morphisec identified and prevented several malicious and sophisticated macro-based documents at the site of one of our customers delivering a fileless Kovter backdoor...

Read More
Posted by Michael Gorelik on October 13, 2016

Morphisec Prevents Major Malspam campaign - Again

In our report at the beginning of September about a large-scale malspam campaign discovered and stopped by Morphisec, we pointed out the central role that malware spam plays for hackers and the...

Read More
Posted by Netta Schmeidler on October 12, 2016

Microsoft released its October patching update today and, as announced, it introduces a major change that has many system administrators wondering just what to do.

Read More
Posted by Netta Schmeidler on October 5, 2016

A Brief History of vdi

Virtual Desktop Infrastructure (VDI) is not a new concept – in fact virtualized desktops can be traced back to the 1960s, when IBM divided up mainframes into virtual machines to allow for multiple, simultaneous users. The...

Read More
Posted by Mordechai Guri, Ph.D. on September 23, 2016

Ransomware has grabbed mainstream media attention recently but it’s nothing new – in fact, its origins can be traced back to floppy disk times. Part of ransomware’s new found notoriety is certainly due to the criminals’ latest target of choice, the...

Read More
Posted by Michael Gorelik on September 16, 2016

New Locky – Zepto variant prevented by Morphisec

Since Locky’s discovery in February 2016, it has emerged as one of the most prevalent and devastating ransomware threats of 2016. Over the last two months, ransomware in general has evolved greatly in...

Read More
Posted by Dudu Mimran on September 14, 2016

It may sound odd, but cybersecurity has a huge emotional component. Unlike other industries that are driven by optimization and financial gains, cybersecurity has all the makings of a Hollywood movie—good guys, bad guys, nation-states attacking...

Read More
Posted by Michael Gorelik on September 8, 2016

Spam is still the preferred attack vector for cyber criminals and malware spam campaigns continue to increase. According to the Symantec Internet Threat Report, 1 in 220 emails in 2015 contained malware. While this figure may seem low, consider that...

Read More
Posted by Arthur Braunstein on August 17, 2016

This year’s Black Hat USA conference was bigger and badder than ever, with attendance up nearly 30% according to show organizers. Of all the security conferences, Black Hat has the most clear divide between the technical practitioner side and the...

Read More
Posted by Mordechai Guri, Ph.D. on August 10, 2016

It’s always an interesting exercise to extrapolate from current technologies and industry challenges to sketch the future landscape. This especially holds true for cyber security, with its rapid growth and change as new threat types, targets and...

Read More
Posted by Morphisec Team on August 4, 2016

Black Hat USA is in full swing, and cyber experts in every field have descended on Vegas to catch up on the latest cyber threat research, see the latest security technologies and cram in as much hacking and fun as possible into a few short days....

Read More
Posted by Morphisec Team on August 3, 2016

One of Morphisec’s mandates is to share our expertise with the industry at large. You’ll find bylines and commentary by team members in numerous publications on everything from the cyber security implications of Brexit to improving supply chain...

Read More
Posted by Morphisec Team on July 26, 2016

Next week begins Black Hat USA 2016, held July 30 – August 4 at the Mandalay Bay Convention Center in Las Vegas. In its 19th year, the iconic cyber security conference still retains an air of mystique despite its acquired patina of glitz and...

Read More
Posted by Michael Gorelik on July 12, 2016

There are kits for everything these days: beer brewing, engine tuning, and, yes, hacking. Hacking's “exploit kits” (EKs)—toolkits with packaged exploit codes—let almost anyone become a digital intruder, from the guy down the hall to the nation-state...

Read More
Posted by Michael Gorelik on July 6, 2016

Angler Hangs Up Its Pole

Back in April, more than 80% of drive by download attacks were attributed to Angler. Now? Nearly zero. Speculation abounds regarding its disappearance earlier this month. A vacation by Angler operators? Black market price...

Read More
Posted by Michael Gorelik on July 2, 2016

The disappearance of Angler has left a gaping hole in the malware market which cybercriminals are only to happy to fill with new variants of old standbys. The latest to reemerge after a period of disuse are Locky and Dridex. A new Locky campaign...

Read More