Microsoft’s decision to end support for Windows 10, its most popular operating system, marks a pivotal moment for businesses relying on this aging platform. As of October 14, 2025, this change will leave organizations with critical decisions about...
Read MoreFileless malware attacks are a malicious code execution technique that works completely within process memory. In a fileless attack, no files are dropped onto a hard drive. With no artifacts on the hard drive to detect, these attacks easily evade...
Read MoreThe cybersecurity landscape continues to evolve, and with it, the need for advanced strategies to combat sophisticated threats. Enter Preemptive Cyber Defense—an innovative approach that’s rapidly gaining traction among organizations looking to...
Read MoreHow do you steal something that doesn’t exist? That’s the thinking behind the widespread fallacy that virtual desktop infrastructure (VDI) is more secure than physical desktops.
Read MoreThe cybersecurity landscape continues to evolve at an unprecedented pace, with 2025 poised to bring even greater complexity and urgency to digital defense strategies. The rapid weaponization of AI technologies is transforming the threat environment,...
Read MoreHouston Eye Associates, the largest provider of ophthalmological and optometric care in Texas, has built a strong reputation over its 50 years of operation. As the organization has grown, so too has its commitment to maintaining a robust...
Read MoreSophisticated attack techniques are increasingly bypassing traditional detection-based cybersecurity solutions. In 2023 Gartner® published a report highlighting Automated Moving Target Defense (AMTD) as “an emerging game-changing technology for...
Read MoreIn recent months AI innovators have rolled out both exciting and concerning AI capabilities. Early this year Microsoft Copilot released new capabilities that while helpful for workflow optimization, heightened the risk of sensitive data exposure and...
Read MoreWhen it comes to the cybersecurity tech stack, many teams admittedly suffer from tech bloat. In many ways the continuous evolution of the threat landscape and an ever-growing list of unique use cases has made tech bloat inevitable. Tools...
Read MoreRansomware has become one of the most prevalent and damaging forms of cybercrime in recent years, affecting businesses, governments and individuals worldwide. The 2024 Verizon Data Breach Investigations Report highlights ransomware as one of the...
Read MoreAs cyber threats continue to evolve, it's clear that traditional, static security measures are no longer sufficient. Organizations must embrace innovative approaches to stay ahead of sophisticated attackers.
Read MoreMandiant cybersecurity researchers recently released a blog on a memory-only dropper which uses a complex multi-stage infection process. This PowerShell-based downloader is being tracked as PEAKLIGHT. Mandiant researcher findings note that this...
Read MoreIn today's rapidly evolving cybersecurity landscape, effective vulnerability management is a cornerstone of maintaining a robust security posture. Yet despite investing significant resources into regular vulnerability assessments and mitigation...
Read MoreThe evolution of cybersecurity has been a journey of increasingly sophisticated defense innovations. It began with basic anti-virus (AV) software, which relied on static analysis to identify known threats by scanning binaries and files.
Read MoreAutomated Moving Target Defense (AMTD) has been recognized in the Gartner Hype Cycle for Endpoint and Workspace Security, 2024 report, in its ‘on the rise’ category. Morphisec is named as a Sample Vendor in the AMTD category for the second year in a...
Read MoreIn the rapidly evolving landscape of cybersecurity, the Managed Detection and Response (MDR) market has undergone significant transformations. What began as a reactive approach focused on detecting and responding to threats has now matured into a...
Read MoreCyber-attacks targeting healthcare facilities ruthlessly exploit personal, vulnerable and highly sensitive information. It’s one of the few industries where attacks can lead to life and death scenarios.
Read MoreThe Crowdstrike and Windows outage highlighted a new reality for all companies: IT systems are critical infrastructure.
Read MoreA recent faulty configuration file in CrowdStrike's Falcon platform caused a significant IT disruption, rendering millions of Windows machines inoperable. The result was a multi-day outage event, which affected critical sectors such as airlines,...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Automated Moving Target Defense (157)
- Threat Research (135)
- Cyber Security News (132)
- Morphisec Labs (124)
- Morphisec News (54)
- Adaptive Exposure Management (14)
- Defense-in-Depth (13)
- Ransomware (12)
- Preemptive Security (11)
- Gartner (10)
- Continuous Threat Exposure Management (CTEM) (9)
- Microsoft (8)
- In-Memory Attacks (7)
- Healthcare Cybersecurity (6)
- Advanced Threat Defense (5)
- Legacy Security (5)
- Artificial Intelligence (4)
- Financial Cybersecurity (4)
- Linux Cybersecurity (4)
- Fileless Malware (3)
- Threat and Vulnerability Management (2)
- Managed Service Providers (1)