Blog

Transforming Incident Response with AI-Driven Innovation

Brad LaPorte | New York | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Ransomware

Brad LaPorte | New York | 23 Dec 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | New York | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Morphisec Marketing Team | 29 Jan 2026

Proactively Securing Linux Systems Against Ransomware: Insights from Morphisec’s 
Monthly Demo 

Linux Security
Ransomware

Brad LaPorte | New York | 08 Dec 2025

Hardening the Backbone: Strengthening Linux Server Security with Preemptive Defense 

Linux Security
Preemptive Security

Brad LaPorte | New York | 23 Sep 2025

Supply Chain to SSH Keys: The Expanding Arsenal of Linux Ransomware Threats 

Linux Security
Ransomware

Brad LaPorte | New York | 11 Sep 2025

Secure the New Attack Frontier—Linux Servers

Linux Security
Preemptive Security

Brad LaPorte | New York | 08 Aug 2025

5 Hidden Weaknesses in Your Linux Stack—And How Attackers Exploit Them 

Fileless Malware
In-Memory Attacks
Linux Security

Brad LaPorte | New York | 14 Jul 2025

Linux Is No Longer Immune: Why Ransomware Gangs Are Going All-In on Linux Targets 

Linux Security

Michael Gerard | 02 Nov 2022

Servers Aren’t as Secure as You Think

Advanced Threat Defense
Automated Moving Target Defense
Defense-in-Depth
In-Memory Attacks
Linux Security

Hudi Zack | 12 Oct 2022

How Can We Secure the IoT?

Linux Security

Introducing AI Incident Analyst – A Game-Changer in Cybersecurity – Register to our live webinar