Microsoft Defender Antivirus (MDAV), known as Windows Defender Antivirus before the Windows 10 May 2020 update, is an anti-malware component of Microsoft Windows. MDAV continually scans for malware, viruses, and advanced security threats.
Read More- The Go language is becoming increasingly popular among threat actors, with attacks starting to appear in 2019
- Morphisec Labs has tracked a new Golang-based (1.17) ransomware variant that appeared starting in late September and continued...
Microsoft Defender Antivirus suffers from a perception problem. For the first decade of its existence, starting with its 2006 release, Defender was a much-maligned piece of software that no business would use to protect its endpoints. That’s no...
Read More- Morphisec Labs tracked a new MirrorBlast campaign targeting financial services organizations
- MirrorBlast is delivered via a phishing email that contains malicious links which download a weaponized Excel document
- MirrorBlast has low detections on...
A successful security breach brings with it a host of legal and financial ramifications, including cleanup costs paid to remediation vendors and possible penalties from the exfiltration of sensitive data. The rise of data protection regulations...
Read MoreNow more than ever, supply chains are attracting threat actor attention. As evidenced by attacks like the one which recently targeted the IT services provider Kaseya and over 1,500 of their clients, trusted relationships between service providers...
Read MoreIn 2020, Morphisec introduced the Jupyter infostealer, a .NET attack that primarily targets Chromium, Firefox, and Chrome browser data while also maintaining the additional capabilities of a backdoor.
Read MoreRansomware developers have powerful financial incentives to continue adding new features to their code. From developers to affiliates, these malicious pieces of software enrich countless cyber criminals at great expense to victims, and will likely...
Read MoreEver since the "Vienna Virus" prompted the development of the first antivirus solution in 1987, cybersecurity has come to resemble a high-stakes game of catch up: new threats appear, defenses are re-designed to defeat these threats, adversaries...
Read MoreOn approximately August 21, 2021, security researchers, cybersecurity leaders, and eventually the CISA began voicing concerns about the inevitable threat of LockFile ransomware attacks on a wide variety of ill-informed and unprepared victims. Threat...
Read MoreEditor's Note: This blog post is courtesy of IT Central Station.
Security Operations (SecOps), never a stress-free area of business, is now struggling with additional pressures. While the threat environment has grown more serious than ever, people...
Read MoreIs that a rat or a phoenix? Usually, the answer to such a question would be simple. However, when it comes to threat actors, nothing is ever as easy as it appears. For this reason we’ve compiled the latest news on cyber threats, new(ish) ransomware...
Read MoreCredential theft is one of the most common ways for adversaries to gain access to critical systems. Multi-factor authentication (MFA) or its cousin two-factor authentication (2FA) are two of the technologies designed to limit this particular type of...
Read MoreAs a landmark piece of legislation, the General Data Protection Regulation (GDPR) was undoubtedly created with the safety and privacy of European consumers’ personal data in mind. However, while certainly designed with good intentions, the GDPR,...
Read MoreThis week in security has seen some new moves from the federal government on zero trust, tighter collaboration with the private tech sector, and more than a few new attacks from groups operating in China and Iran. With that said, here’s the security...
Read MoreThree years ago, a survey conducted by Tripwire during Infosecurity Europe 2018 revealed that almost all of the study’s participants expected the incidence of nation-state cyberattacks to rise in the next 12 months. Many respondents forecast that...
Read MoreWelcome to the Leading from Within series. Here, we showcase leaders from within Morphisec as we discuss emerging topics and trends dear to the cybersecurity community. From ransomware variants to phishing scams, from attacks on healthcare...
Read MoreEditor's Note: This is a guest blog from IT Central Station.
Brian Wagner, the senior network engineer at Wilson County Schools in North Carolina, needed threat prevention solutions that would help improve his overall endpoint protection process ...
Read MoreWow, what a week. From new incentives to become a cyber defender to new targets for threat actors, this week had it all. We start with the $10 million dollar information bounty currently offered by the US Government and we end with the startling...
Read MoreOn July 2, 2021, our Cloud Workload Protection Platform, Morphisec Keep, successfully identified and prevented a REvil ransomware infection in customer domains. This attack was automatically blocked in real time due to Morphisec's proactive...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Automated Moving Target Defense (154)
- Threat Research (134)
- Cyber Security News (131)
- Morphisec Labs (123)
- Morphisec News (55)
- Adaptive Exposure Management (12)
- Defense-in-Depth (12)
- Ransomware (12)
- Gartner (10)
- Continuous Threat Exposure Management (CTEM) (8)
- In-Memory Attacks (7)
- Microsoft (7)
- Preemptive Security (7)
- Threat and Vulnerability Management (7)
- Advanced Threat Defense (6)
- Financial Cybersecurity (4)
- Healthcare Cybersecurity (4)
- Legacy Security (4)
- Linux Cybersecurity (4)
- Runtime Attacks (4)
- ChatGPT (3)
- Evasive Loader (3)
- Fileless Malware (3)
- Patch Management (3)
- Product Blogs (3)
- Artificial Intelligence (2)
- Anti-tampering (1)
- Case Study (1)
- IoT Security (1)
- Managed Service Providers (1)
- Server Security (1)



