NTLM is like that stubborn relic of the past that just won’t go away – a decades-old authentication protocol, seemingly deprecated but still lurking in the shadows of every Windows environment.
Read MoreThe evolution of cybersecurity has been a journey of increasingly sophisticated defense innovations. It began with basic anti-virus (AV) software, which relied on static analysis to identify known threats by scanning binaries and files.
Read MoreIn the rapidly evolving landscape of cybersecurity, the Managed Detection and Response (MDR) market has undergone significant transformations. What began as a reactive approach focused on detecting and responding to threats has now matured into a...
Read MoreSecurity leaders are acutely aware of vulnerability risks. Organizations continue to allocate thousands of dollars to periodic vulnerability assessments, and thousands more to technology and resources for mitigation — yet vulnerability-based breach...
Read MoreAs of January 10th 2023, Windows 7, Windows 8, 8.1, their Windows embedded derivatives, and Windows Server 2008 R2 will no longer receive patches from Microsoft. Millions of devices will now become "legacy" and create a suite of new legacy security...
Read MoreToday, threat and vulnerability management is more critical than ever, with unpatched vulnerabilities involved in 60 percent of data breaches. Vulnerability tools of all stripes abound, yet for all their features, few offer a clear path to action....
Read MoreVirtual desktop infrastructure (VDI) felt like a lifeline at the start of the Coronavirus pandemic. As offices rushed to close down and companies scrambled to operate remotely, those with VDI found the process to be surprisingly seamless. People...
Read MoreSearch Our Site
Recent Posts
Posts by Tag
- Automated Moving Target Defense (153)
- Threat Research (134)
- Cyber Security News (131)
- Morphisec Labs (123)
- Morphisec News (55)
- Defense-in-Depth (12)
- Ransomware (12)
- Adaptive Exposure Management (11)
- Gartner (10)
- Continuous Threat Exposure Management (CTEM) (8)
- In-Memory Attacks (7)
- Microsoft (7)
- Threat and Vulnerability Management (7)
- Advanced Threat Defense (6)
- Preemptive Security (6)
- Financial Cybersecurity (4)
- Healthcare Cybersecurity (4)
- Legacy Security (4)
- Linux Cybersecurity (4)
- Runtime Attacks (4)
- ChatGPT (3)
- Evasive Loader (3)
- Fileless Malware (3)
- Patch Management (3)
- Product Blogs (3)
- Artificial Intelligence (2)
- Anti-tampering (1)
- Case Study (1)
- IoT Security (1)
- Managed Service Providers (1)
- Server Security (1)