Blog

Why Ransomware Victims Still Pay — and How to Avoid the Ransom Altogether  

Brad LaPorte | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Adaptive Exposure Management
Fileless Malware
Preemptive Security
Ransomware

Brad LaPorte | 28 Jul 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Michael Gerard | 18 May 2023

Why EDR Is Not Enough to Prevent Ransomware [Infographic]

Automated Moving Target Defense

Michael Dereviashkin | 15 Feb 2023

Don’t Sleep on the New ProxyShellMiner Campaign

Automated Moving Target Defense
Cybersecurity News
Defense-in-Depth
Morphisec Labs
Threat Research

Oren Dvoskin | 25 Jan 2023

Will ChatGPT Create Super Malware?

Artificial Intelligence
Automated Moving Target Defense

Michael Gerard | 02 Nov 2022

Servers Aren’t as Secure as You Think

Advanced Threat Defense
Automated Moving Target Defense
Defense-in-Depth
In-Memory Attacks
Linux Security

Hudi Zack | 04 Aug 2022

How Do You Stop Supply Chain Attacks?

Automated Moving Target Defense

Mitchell Hall | 13 Jul 2022

How to Resolve the Ransomware Security Gap

Automated Moving Target Defense

Bill Reed | 31 May 2022

Secure the New Attack Frontier—Linux Servers

Automated Moving Target Defense

Bill Reed | 27 Apr 2022

How SMBs Can Stop Their Next Big Cyberattack

Automated Moving Target Defense

Michael Gorelik | 09 Mar 2022

Stop Ransomware and Other Advanced Threats With Automated Moving Target Defense

Automated Moving Target Defense

Michael Gorelik | 20 Jan 2022

Log4j Exploit Hits Again: Vulnerable VMWare Horizon Servers at Risk

Automated Moving Target Defense
Morphisec Labs
Threat Research

Michael Gorelik | 12 Jan 2022

How to Stop Ransomware: See Breach Prevention in Action vs. the Cobalt Strike Backdoor

Automated Moving Target Defense
Morphisec Labs
Threat Research

Michael Gorelik | 17 Dec 2021

Protecting Against the Log4j (Log4Shell) Vulnerability

Automated Moving Target Defense
Morphisec Labs
Threat Research