Recent Webinar: Building an Adaptive Cyber Resilient Cloud
arrow-white arrow-white Watch now
close
Posted by Shelley Leveson on June 1, 2016

How do you outsmart malware? In an article published by Tech Crunch last week, tech reporter Ben Dickson investigates the new generation of smart malware. He manages to sum up the crux of the problem in two sentences: “Virus definition databases...

Read More
Posted by Morphisec Team on May 31, 2016

CVE-2015-2545 is the vulnerability that just keeps on giving. First spotted in August 2015, in a targeted attack by the Platinum Group, it allows attackers to bypass system memory protections via a malicious EPS image file embedded in a Microsoft...

Read More
Posted by Morphisec Team on May 30, 2016

Join Morphisec at Infosecurity Europe 2016 at Olypmia in London June 7-9. Marking our recently established partnership, we are thrilled to exhibit together with XML International, a leading global provider of consulting and authorized Morphisec...

Read More
Posted by Arthur Braunstein on May 25, 2016

The ancients’ experience of modern computing was limited to say the least, but they gave us a nice framework, The Socratic Method for cyber security, that moderns can use for dealing with the problem of cyber security. The Socratic Method is a...

Read More
Posted by Morphisec Team on May 24, 2016

Recently, software engineer and noted tech journalist Ben Dickson explored the growing threat of ransomware in an article in The Daily Dot. He gives a thorough yet remarkably non-techie overview before tackling the difficult part – what can...

Read More
Posted by Morphisec Team on May 23, 2016

Excerpted from the ebook “Deception and Counter Deception: Moving Target Attacks vs. Moving Target Defense” by Mordechai Guri, Chief Science Officer at Morphisec. Download the full eBook here.

In the arms race between cyber attackers and cyber...

Read More
Posted by Morphisec Team on April 27, 2016

Excerpted from the ebook “Deception and Counter Deception: Moving Target Attacks vs. Moving Target Defense” by Mordechai Guri, Chief Science Officer at Morphisec. Download the full eBook here.

Cyber attackers constantly develop new methods to...

Read More
Posted by Ursula Ron on April 20, 2016

The technology research group TechTarget recently published their findings from a survey on endpoint security at medium to large enterprises. The results corroborate trends all too evident in the news:   Despite the features and functionality added to

Read More
Posted by Michael Gorelik on April 13, 2016

After the burst of the bug bubble, I’m left wondering who at SerNet decided the Badlock marketing campaign was a good idea and why.  It certainly was not, as claimed, to raise awareness for a critical bug that needed immediate patching.

Read More
Posted by Morphisec Team on March 21, 2016

The Carbanak APT group, aka “Anunak,” (dubbed Carbanak by Kaspersky Labs to reflect its Carberp origins) is one of the most notorious cybercriminal groups to target the Financial sector. Since Carbanak was first released in December 2014, around 100...

Read More
Posted by Omri Dotan on February 12, 2016

In the current state of cyber security, the bad guys have the upper hand. Cybercrime is an industry, in which huge investments are made by criminal elements. Why? Because ROI is basically guaranteed. Building attacks takes time, requires patience,...

Read More
Posted by Michael Gorelik on January 13, 2016

The recent discovery of vulnerabilities in antivirus software by enSilo sparked curiosity among the Morphisec Labs team. After a long deep dive our research found that the vulnerability wasn’t an unintentional flaw in the code, it was a feature!...

Read More
Posted by Morphisec Team on December 20, 2015

Explosive news about vulnerabilities found in FireEye's security software are hitting the headlines. ZDNet, Ars Technica, PCworld and more reported about the findings by the Google Project Zero researchers. First, let’s give kudos to FireEye for...

Read More
Posted by Mordechai Guri, Ph.D. on December 17, 2015

We often get asked how our Moving Target Defense (MTD) approach differs from ASLR. While the concepts may sound similar, ASLR is missing several key elements to make it successful at countering zero-day and targeted attacks.

Read More