Blog

Automated Moving Target Defense Research Guide

Brad LaPorte | 29 Jul 2025

You Can’t Recover What You Never Captured: Why Forensic Recovery Is Central to Cyber Resilience

Preemptive Security
Ransomware

Brad LaPorte | 23 Dec 2025

Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 10 Jul 2025

Why Endpoint Security Needs a Rethink: From Reactive to Preemptive Defense 

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Arnold Osipov | 06 Jun 2024

Howling at the Inbox: Sticky Werewolf’s Latest Malicious Aviation Attacks

Morphisec Labs
Threat Research

Jay Kurup | 24 Apr 2024

Threat Bulletin – New variant of IDAT Loader

Threat Research

Brad LaPorte | 11 Apr 2024

History of Ransomware: The Evolution of Attacks and Defense Mechanisms

Automated Moving Target Defense
Ransomware
Threat Research

Jay Kurup | 03 Apr 2024

Threat Bulletin – CVE-2024-2883

Cybersecurity News
Fileless Malware
Threat Research

Michael Dereviashkin | 26 Feb 2024

Unveiling UAC-0184: The Steganography Saga of the IDAT Loader Delivering Remcos RAT to a Ukraine Entity in Finland

Morphisec Labs
Threat Research

Jay Kurup | 20 Feb 2024

Cracking Akira Ransomware: Prevention and Analysis by TTPs

Morphisec Labs
Threat Research

Arnold Osipov | 18 Jan 2024

Chae$ Chronicles: Version 4.1 Dedicated to Morphisec Researchers

Cybersecurity News
Morphisec Labs
Threat Research

Jay Kurup | 08 Jan 2024

Threat Bulletin – CVE-2023-7024

Threat Research

Michael Gorelik | 13 Dec 2023

Responding to CitrixBleed (CVE-2023-4966): Key Takeaways from Affected Companies

Cybersecurity News
Morphisec Labs
Threat Research

Hido Cohen & Arnold Osipov | 05 Sep 2023

Chae$ 4: New Chaes Malware Variant Targeting Financial and Logistics Customers

Morphisec Labs
Threat Research

Arnold Osipov | 29 Jun 2023

GuLoader Campaign Targets Law Firms in the US

Morphisec Labs
Threat Research

Arnold Osipov & Michael Dereviashkin | 18 Apr 2023

What Makes Invalid Printer Loader so Stealthy?

Morphisec Labs
Threat Research

See Morphisec in Action: Proactively Secure Linux Systems Against Ransomware Attacks