Recent Webinar: Building an Adaptive Cyber Resilient Cloud
arrow-white arrow-white Watch now
close

News & EventsThe Latest From Morphisec

Media Coverage

October 8, 2024

Gamers Tricked Into Downloading Lua-Based Malware via Fake Cheating Script Engines

Users searching for game cheats are being tricked into downloading a Lua-based malware that is capable of establishing persistence on infected systems and delivering additional payloads.

Read More
October 8, 2024

Lua Malware Targeting Student Gamers via Fake Game Cheats

Morphisec Threat Labs uncovers sophisticated Lua malware targeting student gamers and educational institutions. Learn how these attacks work and how to stay protected.

Read More
October 2, 2024

Deception Technology: Changing the Game for Cybercriminals | SecurityANGLE

Shelly Kramer, managing director and principal analyst at theCUBE Research is joined by fellow analyst and frequent co-host Jo Peterson on the SecurityANGLE podcast for a conversation about deception technology, a strategy designed to attract cybercriminals away from an enterprise’s true assess and divert them to a decoy or trap, is gaining traction today.

Read More
September 4, 2024

Cicada3301 ransomware: How similar is it to ALPHV/BlackCat?

Analyses of the emerging Cicada3301 ransomware-as-a-service (RaaS) uncovered similarities to the defunct ALPHV/BlackCat ransomware strain, suggesting a potential rebrand of the notorious cybercrime gang.

Read More
September 3, 2024

BlackCat Spin-off 'Cicada3301' Uses Stolen Creds on the Fly, Skirts EDR

Malware authors have iterated on one of the premier encryptors on the market, building something even bigger and better.

Read More
September 3, 2024

New Rust-Based Ransomware Cicada3301 Targets Windows and Linux Systems

Cybersecurity researchers have unpacked the inner workings of a new ransomware variant called Cicada3301 that shares similarities with the now-defunct BlackCat (aka ALPHV) operation.

Read More
August 14, 2024

Microsoft Outlook security hole lets attackers in without opening a tainted message

The zero-click hole, which was patched by Microsoft Tuesday, could point to far more vulnerabilities in the form-based architecture of Outlook.

Read More
August 13, 2024

Zero-Click Outlook Vulnerability Triggered RCE When Email is Opened – Technical Analysis

Morphisec researchers have recently uncovered a critical vulnerability in Microsoft Outlook, identified as CVE-2024-30103. It can execute malicious code as soon as an email is opened.

Read More
August 7, 2024

The Evolution of Cyber Resiliency and the Role of Adaptive Exposure Management

As cyber threats continue to evolve in complexity and frequency, organizations must adopt a cybersecurity strategy as dynamic as the threats they aim to combat.

Read More
July 23, 2024

5 ways threat actors are taking advantage of the CrowdStrike outage

Handala hacking group claims wiper attack leveraging fake CrowdStrike fix.

Read More

SANS Institute's Latest Product Review of Morphisec

SANS Instructor Matt Bromiley reviews Morphisec's moving target defense technology, which is designed to defeat threats such as zero-days, evasive malware, fileless attacks and exploits by morphing process memory.

Watch the webcast

SANS Product Review-18