Recent Webinar: Building an Adaptive Cyber Resilient Cloud
arrow-white arrow-white Watch now
close
Posted by Morphisec Team on November 13, 2024

Houston Eye Associates, the largest provider of ophthalmological and optometric care in Texas, has built a strong reputation over its 50 years of operation. As the organization has grown, so too has its commitment to maintaining a robust...

Read More
Posted by Brad LaPorte on November 11, 2024

Sophisticated attack techniques are increasingly bypassing traditional detection-based cybersecurity solutions. In 2023 Gartner® published a report highlighting Automated Moving Target Defense (AMTD) as “an emerging game-changing technology for...

Read More
Posted by Brad LaPorte on November 7, 2024

In recent months AI innovators have rolled out both exciting and concerning AI capabilities. Early this year Microsoft Copilot released new capabilities that while helpful for workflow optimization, heightened the risk of sensitive data exposure and...

Read More
Posted by Brad LaPorte on October 17, 2024

When it comes to the cybersecurity tech stack, many teams admittedly suffer from tech bloat. In many ways the continuous evolution of the threat landscape and an ever-growing list of unique use cases has made tech bloat inevitable. Tools...

Read More
Posted by Jay Kurup on October 15, 2024

Ransomware has become one of the most prevalent and damaging forms of cybercrime in recent years, affecting businesses, governments and individuals worldwide. The 2024 Verizon Data Breach Investigations Report highlights ransomware as one of the...

Read More
Posted by Brad LaPorte on September 17, 2024

As cyber threats continue to evolve, it's clear that traditional, static security measures are no longer sufficient. Organizations must embrace innovative approaches to stay ahead of sophisticated attackers. 

Read More
Posted by Jay Kurup on September 10, 2024

Mandiant cybersecurity researchers recently released a blog on a memory-only dropper which uses a complex multi-stage infection process. This PowerShell-based downloader is being tracked as PEAKLIGHT. Mandiant researcher findings note that this...

Read More
Posted by Hanni Barry on September 5, 2024

In today's rapidly evolving cybersecurity landscape, effective vulnerability management is a cornerstone of maintaining a robust security posture. Yet despite investing significant resources into regular vulnerability assessments and mitigation...

Read More
Posted by Jay Kurup on August 29, 2024

The evolution of cybersecurity has been a journey of increasingly sophisticated defense innovations. It began with basic anti-virus (AV) software, which relied on static analysis to identify known threats by scanning binaries and files. 

Read More
Posted by Brad LaPorte on August 22, 2024

Once considered a passing fad, ransomware attacks have consistently risen in frequency and complexity. New research from Cyentia confirms ransomware’s threat dominance — its findings note that ransomware accounts for 32% of all security incidents...

Read More
Posted by Brad LaPorte on August 20, 2024

Automated Moving Target Defense (AMTD) has been recognized in the Gartner Hype Cycle for Endpoint and Workspace Security, 2024 report, in its ‘on the rise’ category. Morphisec is named as a Sample Vendor in the AMTD category for the second year in a...

Read More
Posted by Brad LaPorte on August 8, 2024

In the rapidly evolving landscape of cybersecurity, the Managed Detection and Response (MDR) market has undergone significant transformations. What began as a reactive approach focused on detecting and responding to threats has now matured into a...

Read More
Posted by Brad LaPorte on August 5, 2024

Cyber-attacks targeting healthcare facilities ruthlessly exploit personal, vulnerable and highly sensitive information. It’s one of the few industries where attacks can lead to life and death scenarios.

Read More
Posted by Brad LaPorte on July 29, 2024

The Crowdstrike and Windows outage highlighted a new reality for all companies: IT systems are critical infrastructure. 

Read More
Posted by Michael Gorelik on July 24, 2024

A recent faulty configuration file in CrowdStrike's Falcon platform caused a significant IT disruption, rendering millions of Windows machines inoperable. The result was a multi-day outage event, which affected critical sectors such as airlines,...

Read More
Posted by Brad LaPorte on July 18, 2024

When it comes to endpoint security, Microsoft Defender for Endpoint stands out as a popular choice. It's the fastest-growing endpoint protection platform, boasting over 19% market share, and for good reason — Microsoft Defender for Endpoint provides...

Read More
Posted by Brad LaPorte on April 16, 2024

Morphisec announced the launch of the Anti-Ransomware Assurance Suite to help organizations pre-emptively reduce exposure to cyber risk, proactively prevent advance threats and ensure optimal anti-ransomware defense. Powered by Automated Moving...

Read More
Posted by Brad LaPorte on April 11, 2024

Globally, ransomware is big business, with millions of attacks targeting organizations every day. Not every attack is financially successful, but with keen attention to detail, attackers have (and continue to) tune tactics, making ransomware a...

Read More
Posted by Arnold Osipov on March 26, 2024

Recently, Morphisec Labs identified a significant increase in activity linked to Mispadu (also known as URSA), a banking trojan first flagged by ESET in 2019. Initially concentrated on LATAM countries and Spanish-speaking individuals, Mispadu has...

Read More
Posted by Brad LaPorte on March 11, 2024

(Updated March 29th, 2024)

The National Vulnerability Database (NVD) has long been a crucial resource for organizations in managing their vulnerability lifecycle and ensuring the security of their systems. However, recent developments have...

Read More