<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=32136&amp;fmt=gif">

NEWS AND EVENTSThe Latest From Morphisec

MEDIA COVERAGE

June 20, 2018

Key Findings from the Morphisec Labs’ Threat Report for Q1 of 2018

Endpoint security solution provider Morphisec today released the inaugural edition of the Morphisec Labs’ Threat Report for Q1 of 2018.

Read More
April 17, 2018

INSIDE THE UNNERVING SUPPLY CHAIN ATTACK THAT CORRUPTED CCLEANER

CCleaner owner Avast is sharing more details on the malware attackers used to infect legitimate software updates with malware.

Read More
April 10, 2018

Exploit kits once again ride Flash Player flaws to attack Windows

Adobe’s Flash Player might be on the way out and exploit kits have taken a backseat to cryptominers, but cybercriminals are still finding ways to harness the potent pairing.

Read More
April 9, 2018

Artificial intelligence has a lot to learn about malware protection

Traditional signature-based detection, i.e., antivirus, has proven wholly ineffective in today’s threat landscape where thousands of new variants are created daily, each with a new signature.

Read More
April 4, 2018

THE BILLION-DOLLAR HACKING GROUP BEHIND A STRING OF BIG BREACHES

Saks Fifth Avenue, Saks Off 5th, and Lord & Taylor department stores—all owned by The Hudson’s Bay Company—acknowledged a data breach impacting more than five million credit and debit card numbers. The culprits? The same group that's spent the last few years pulling off data heists from Omni Hotels & Resorts, Trump Hotels, Jason’s Deli, Whole Foods, Chipotle: A mysterious group known as Fin7.

Read More
April 4, 2018

Watering hole computer attack strategies resurface

A hacking technique - watering hole attacks - has resurfaced for the first time since 2015/16. Morphisec's CTO and malware prevention expert, Michael Gorelik, says it's back and more sophisticated than before, and will be the big thing in 2018.

Read More
March 26, 2018

Watering Hole Attack Exploits North Korea's Flash Flaw

An attack leveraging the compromised website of a Hong Kong telecommunications company is using a recently patched Flash vulnerability that has been exploited by North Korea since mid-November 2017, Morphisec warns.

Read More
March 8, 2018

CIGslip Lets Attackers Bypass Microsoft Code Integrity Guard

A new attack method lets attackers bypass Microsoft's Code Integrity Guard (CIG) and inject malicious code into protected processes, including Microsoft Edge. Researchers at Morphisec this week disclosed the details of the technique and proof-of-concept code.

Read More
March 7, 2018

CIGslip Attack Bypasses Windows Code Integrity Guard (CIG)

Malware authors can exploit a flaw in the Windows Code Integrity Guard (CIG) security mechanism to inject malicious, unsigned code into CIG-protected applications, considered to be immune to such attacks.

Read More
March 5, 2018

Six Recently Funded Israeli Startups You Need To Know

Every month, Start-Up Nation Central’s channel on Forbes will highlight a handful of startups that have recently raised funding, and that we think are important to keep an eye on.

Read More
vdi-guidebook-download-now

SANS Institute's Latest Product Review of Morphisec

SANS Instructor Matt Bromiley reviews Morphisec's moving target defense technology, which is designed to defeat threats such as zero-days, evasive malware, fileless attacks and exploits by morphing process memory.

Watch the Webcast

SANS Product Review-18