Morphisec’s Blog

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Category
A hand reaching for computer cables with a warning icon overlay, suggesting a cybersecurity or hardware risk.

Michael Gorelik | 20 Jan 2022

Log4j Exploit Hits Again: Vulnerable VMWare Horizon Servers at Risk

Automated Moving Target Defense
Morphisec Labs
Threat Research
Person wearing a hooded jacket with arms crossed, standing in front of a digital background with binary code and numbers.

Michael Gorelik | 12 Jan 2022

How to Stop Ransomware: See Breach Prevention in Action vs. the Cobalt Strike Backdoor

Automated Moving Target Defense
Morphisec Labs
Threat Research
A digital illustration of a Trojan horse composed of green lines and computer code, symbolizing cybersecurity threats and malware.

Michael Gorelik | 17 Dec 2021

Protecting Against the Log4j (Log4Shell) Vulnerability

Automated Moving Target Defense
Morphisec Labs
Threat Research
A computer graphics card with a Bitcoin symbol overlay, representing cryptocurrency mining technology.

Arnold Osipov & Hido Cohen | 23 Nov 2021

Babadeda Crypter Targeting Crypto, NFT, and DeFi Communities

Morphisec Labs
Threat Research
Hands typing on a laptop with a digital overlay showing a skull and crossbones, symbolizing hacking or cybersecurity threats.

Michael Gorelik | 18 Nov 2021

The Notorious Emotet Is Back: What Organizations Need to Know

Morphisec Labs
Threat Research
A cup of coffee on a saucer sits next to a laptop on a wooden table by a window.

Hido Cohen & Michael Dereviashkin | 28 Oct 2021

DECAF Ransomware: A New Golang Threat Makes Its Appearance

Morphisec Labs
Threat Research
Previous
Page 10 of 17
1 ... 7 8 9 10 11 12 13 ... 17
Next