This weekend on security news in review, we have some new data on firmware attacks against global enterprises, insights into how much damage ransomware has caused the healthcare industry, and the Department of Homeland Security laying out a new...
Read MoreIn this week’s edition of Security News in Review, there’s new stories about the ransomware attack that locked up Acer’s computer systems, insight into how many Microsoft Exchange servers remain unpatched, and some theorizing on whether takedowns of...
Read MoreOver 30 years ago, a disgruntled researcher unleashed the first noted ransomware virus, the “Aids Trojan.” Distributed on 20,000 floppy disks marked “AIDS Information — Introductory Diskettes'' using hijacked mail subscriber lists to the World...
Read MoreIn this week’s edition of our roundup of the cybersecurity news, you’ll find information on Microsoft’s Patch Tuesday in case you missed it, new insights into the Server hack, and information on the rise in K-12 cyberattacks among other important...
Read MoreIn this week’s edition of our roundup of the cybersecurity news, you’ll find reporting on a new trend of ransomware gangs turning to virtual machines, several high-severity vulnerabilities in the Linux kernel being resolved, and some new...
Read MoreWe’re back after a skipped Security News in Review last week. In this week’s edition of our roundup of the biggest cybersecurity news stories, we have reporting on ransomware attacks shutting down Underwriters Laboratories and a payment processor...
Read MoreEvery week, the Morphisec team works hard to bring you the top stories from around the security media-sphere to make your job and securing your critical infrastructure easier.
In today’s weekly edition of Security News in Review, you’ll find news...
Read MoreEvery week, the Morphisec team works hard to bring you the top stories from around the security media-sphere to make your job and securing your critical infrastructure easier.
Read MoreIn today’s weekly edition of Security News in Review, the Morphisec team is bringing you stories about how a cyberattack forced a Belgian hospital to redirect patients, the discovery of yet another malware strain used in the SolarWinds attack, and...
Read MoreRisk mitigation in cybersecurity is a fast-changing target for companies of all sizes. Each week, the team at Morphisec reads dozens of news sites to keep up with the stories that matter so you can stay on top of the changing threat landscape and...
Read MoreCybersecurity spending has continued moving upward trend over the past several years. Just last year, budgets increased 12.4%. In 2020, Gartner expects a more modest increase of 2.4% ending at $123 billion in IT security spending for the year ...
Read MoreThe economic impact of a successful breach is one of the easiest to quantify. It’s also increasing constantly, with analysts predicting the cost of cybercrime globally will exceed $6 trillion annually by 2021, a 100% increase from 2015. Much of this...
Read MoreWhen it comes to public health, good hygiene is paramount in avoiding infection. For companies looking to prevent cyber attacks, good cyber hygiene becomes vital. According to a report by Accenture, the average number of security breaches a company...
Read MoreThe term “new normal” means different things to different people. For some, the term is synonymous with a return to the office (just with a few tweaks), while others think that co-located teams are gone for good. The reality is probably somewhere in...
Read MoreMillions of desks are sitting empty because of the COVID-19 epidemic, turning remote work into the “new normal.” Sudden as this transformation may be, however, it’s actually an acceleration of existing trends.
Read MoreGoogle, SpaceX, and even NASA, recently banning employee use of Zoom as they shift to work-from-home workforces in response to COVID-19 have shined a spotlight on the widely popular video conferencing tool’s security flaws. While “ZoomBombing”...
Read MoreWith shut-down orders closing offices across the country, millions of Americans have started working remotely. Apps like Skype, Zoom, and dozens of others make it relatively easy to remain connected and productive. They’ve become so indispensable,...
Read MoreMalware authors worldwide have targeted the fear around COVID-19 as a way to further their goals. This isn’t really a new method of enticing people to download and run their malware; threat actors have always used disasters as a way to deliver their...
Read MoreRecently, news came out about a CVE-2020-0674 vulnerability in Microsoft’s Internet Explorer scripting engine based on how the browser handles memory. More specifically, within the JScript component of the scripting engine is an unspecified memory...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Moving Target Defense (116)
- Cyber Security News (115)
- Morphisec Labs (100)
- Threat Post (56)
- Threat Research (50)
- Morphisec News (49)
- Ransomware defense (5)
- zero trust architecture (3)
- Linux servers (2)
- advanced persistent threat (2)
- Mars Stealer (1)
- Microsoft Defender (1)
- NIST (1)
- SMB cybersecurity (1)
- SYK crypter (1)
- Virtual patching (1)
- healthcare cybersecurity (1)