Morphisec’s Blog

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Category
Hands typing on a laptop keyboard with a translucent warning triangle symbol overlayed on the image.

Morphisec Labs | 28 Jan 2022

Log4j Exploit Hits Again: Vulnerable Unifi Network Application (Ubiquiti) at Risk

Morphisec Labs
Threat Research
A wooden Trojan horse figurine sits on top of a surface covered with various numbers and letters.

Michael Dereviashkin | 25 Jan 2022

New Threat Campaign Identified: AsyncRAT Introduces a New Delivery Technique

Morphisec Labs
Threat Research
A hand reaching for computer cables with a warning icon overlay, suggesting a cybersecurity or hardware risk.

Michael Gorelik | 20 Jan 2022

Log4j Exploit Hits Again: Vulnerable VMWare Horizon Servers at Risk

Automated Moving Target Defense
Morphisec Labs
Threat Research
Person wearing a hooded jacket with arms crossed, standing in front of a digital background with binary code and numbers.

Michael Gorelik | 12 Jan 2022

How to Stop Ransomware: See Breach Prevention in Action vs. the Cobalt Strike Backdoor

Automated Moving Target Defense
Morphisec Labs
Threat Research
A digital illustration of a Trojan horse composed of green lines and computer code, symbolizing cybersecurity threats and malware.

Michael Gorelik | 17 Dec 2021

Protecting Against the Log4j (Log4Shell) Vulnerability

Automated Moving Target Defense
Morphisec Labs
Threat Research
A computer graphics card with a Bitcoin symbol overlay, representing cryptocurrency mining technology.

Arnold Osipov & Hido Cohen | 23 Nov 2021

Babadeda Crypter Targeting Crypto, NFT, and DeFi Communities

Morphisec Labs
Threat Research
Previous
Page 10 of 18
1 ... 7 8 9 10 11 12 13 ... 18
Next

Monthly Demo: See Morphisec’s New Adaptive AI Defense in Action