Blog

Noodlophile Stealer Evolves: Targeted Copyright Phishing Hits Enterprises with Social Media Footprints 

Brad LaPorte | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Adaptive Exposure Management
Fileless Malware
Preemptive Security
Ransomware

Brad LaPorte | 28 Jul 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Jay Kurup | 28 May 2024

Adaptive Cyber Resilience Best Practices

Adaptive Exposure Management
Preemptive Security

Brad LaPorte | 03 Apr 2024

Preventing Ransomware and Advanced Endpoint Threats with Morphisec + Microsoft Defender for Endpoint

Microsoft
Preemptive Security
Ransomware

Brad LaPorte | 12 Feb 2024

Using Annual Loss Expectancy for Cybersecurity Tech Investment Planning

Preemptive Security

Matthew Delman | 01 Oct 2021

Unwanted Gift: Ransomware, Supply Chain Attacks, and How to Prevent Them

Preemptive Security
Ransomware

Morphisec Team | 24 Sep 2020

Proactive Cloud Workload Security Strategy

Linux Security
Preemptive Security