Morphisec’s Blog

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Category
Person wearing a hooded jacket with arms crossed, standing in front of a digital background with binary code and numbers.

Michael Gorelik | 12 Jan 2022

How to Stop Ransomware: See Breach Prevention in Action vs. the Cobalt Strike Backdoor

Automated Moving Target Defense
Morphisec Labs
Threat Research
A digital illustration of a Trojan horse composed of green lines and computer code, symbolizing cybersecurity threats and malware.

Michael Gorelik | 17 Dec 2021

Protecting Against the Log4j (Log4Shell) Vulnerability

Automated Moving Target Defense
Morphisec Labs
Threat Research
A computer graphics card with a Bitcoin symbol overlay, representing cryptocurrency mining technology.

Arnold Osipov & Hido Cohen | 23 Nov 2021

Babadeda Crypter Targeting Crypto, NFT, and DeFi Communities

Morphisec Labs
Threat Research
Hands typing on a laptop with a digital overlay showing a skull and crossbones, symbolizing hacking or cybersecurity threats.

Michael Gorelik | 18 Nov 2021

The Notorious Emotet Is Back: What Organizations Need to Know

Morphisec Labs
Threat Research
A cup of coffee on a saucer sits next to a laptop on a wooden table by a window.

Hido Cohen & Michael Dereviashkin | 28 Oct 2021

DECAF Ransomware: A New Golang Threat Makes Its Appearance

Morphisec Labs
Threat Research
A wooden Trojan horse figurine sits on top of a surface covered with various numbers and letters.

Morphisec | 14 Oct 2021

Explosive New MirrorBlast Campaign Targets Financial Companies

Financial Cybersecurity
Morphisec Labs
Threat Research
Previous
Page 8 of 15
1 ... 5 6 7 8 9 10 11 ... 15
Next