Blog

From Fileless Attacks to Identity Abuse: The Hard Truth About Ransomware in 2026 

Brad LaPorte | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Ransomware

Brad LaPorte | 23 Dec 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Brad LaPorte | 09 Feb 2026

From Fileless Attacks to Identity Abuse: The Hard Truth About Ransomware in 2026 

Fileless Malware
Ransomware

Brad LaPorte | 05 Feb 2026

Customer Success Stories: What Ransomware Prevention Actually
Looks Like in the Real World 

Preemptive Cyber Defense

Brad LaPorte | 02 Feb 2026

Can We Talk About This Now? Shai-Hulud Wave 2 Targeting npm

Fileless Malware
Ransomware

Morphisec Marketing Team | 29 Jan 2026

Proactively Securing Linux Systems Against Ransomware: Insights from Morphisec’s 
Monthly Demo 

Linux Security
Ransomware

Michael Gorelik | 29 Jan 2026

Threat Bulletin: Critical eScan Supply Chain Compromise

Threat and Vulnerability Management

Brad LaPorte | 22 Jan 2026

Evolve or Be Exposed: Why Financial Institutions Must Shift to Preemptive Cyber Defense 

Preemptive Cyber Defense

Brad LaPorte | 20 Jan 2026

Ransomware in Healthcare: A Life-Critical Business Priority for 2026 

Automated Moving Target Defense
Healthcare Cybersecurity
Ransomware

Brad LaPorte | 15 Jan 2026

How to Protect Against Modern Ransomware: 
Morphisec’s New Prevention Capabilities 

Preemptive Security
Ransomware

Brad LaPorte | 12 Jan 2026

A New Supply Chain Threat Targeting Developers: What You Need to Know About PyStoreRAT 

Threat Research

Brad LaPorte | 08 Jan 2026

Russian-Linked StealC V2 Campaign Using Trusted Creative Platforms to Evade Detection: What You Need to Know 

Threat Research

Brad LaPorte | 05 Jan 2026

When Malware Hides in Plain Sight: How Morphisec Blocked a Tuoni C2 Attack Before It Became a Breach 

Threat Research

Brad LaPorte | 01 Jan 2026

Ransomware Without Encryption: Why Pure Exfiltration Attacks Are Surging—and Why They’re So Hard to Catch 

Ransomware