The latest from and about Morphisec.
In this podcast, Paul Roberts speaks with VP R&D Michael Gorelik CCleaner hack – a hack that Morphisec discovered.
Gorelik is convinced that supply-chain attacks will increase in frequency but believes that there are already other products out there with malicious code added to them...
Michael Gorelik, VP R&D at Morphisec, explained that [...] the TLS initialization of callback functions was probably altered by a modification of the visual studio runtime file.
On Sept. 12, Morphisec warned Avast of the infection, and the latter was able to resolve the issue within 72 hours.
The compromised version of CCleaner [...] was undetected for four weeks, "underscoring the sophistication of the attack," Morphisec VP R&D Michael Gorelik wrote in a blog post.
We thank Morphisec and we owe a special debt to their clever people who identified the threat and allowed us to go about the business of mitigating it.
Morphisec expands U.S. operations with new head of channel sales.
New version protects enterprises from today’s most destructive advanced attacks and future unknown threats.
Morphisec today announced John Petrie, information security professional with more than 25 years’ experience in the industry, has joined its Advisory Board.
With its latest version Morphisec continues to disrupt the endpoint security space with even deeper security intelligence and an enhanced morphing engine.
Morphisec SIEM integrations provide SecOps with real-time incidence response and fingerprint information on zero day and advanced attacks.
Increasing momentum marked by accelerated customer acquisition and strategic staffing additions.