Blog

Identity Risk Visibility: The Next Frontier in Preemptive Cyber Defense 

Brad LaPorte | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Preemptive Security
Ransomware

Brad LaPorte | 28 Jul 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Brad LaPorte | 01 Jul 2025

Ransomware Defense Strategies for Lean IT Teams 

Ransomware

Brad LaPorte | 30 Jun 2025

The Future of Ransomware Defense: Insights from Our CTO Briefing 

Ransomware

Brad LaPorte | 26 Jun 2025

Ransomware Is Rising—Stop It Before It Starts with Morphisec 

Ransomware

Brad LaPorte | 24 Jun 2025

Why Exfiltration Prevention is Critical in Today’s Ransomware Landscape

Ransomware

Brad LaPorte | 27 May 2025

What Is Anti-Ransomware? Why Detection Alone Won’t Stop the Next Attack

Preemptive Security
Ransomware

Brad LaPorte | 19 May 2025

Inside the Morphisec Anti-Ransomware Assurance Suite: The Future of Ransomware Protection 

Ransomware

Alon Shekalim | 12 May 2025

Breaking Down Ransomware Encryption: Key Strategies, Algorithms and Implementation Trends 

Ransomware

Michael Gorelik | 24 Apr 2025

ELENOR-corp Ransomware: A New Mimic Ransomware Variant Attacking the Healthcare Sector

Cybersecurity News
Morphisec Labs
Ransomware
Threat Research

Alon Shekalim | 17 Apr 2025

ValleyRAT Malware and the Evolving Landscape of Ransomware Threats 

Ransomware
Threat Research

Brad LaPorte | 07 Apr 2025

Ransomware Trends: The Most Notable Attacks of the Last Six Months 

Ransomware

Brad LaPorte | 24 Mar 2025

The Evolution of Cybersecurity: From Zero Trust to Preemptive Cyber Defense 

Ransomware

Brad LaPorte | 20 Mar 2025

The State of Ransomware in 2025: The Growing Risk in Cloud Environments 

Ransomware

Join Morphisec LIVE: A Deep Dive into SecTor 2025’s Signature of Destruction