EXCLUSIVE WEBINAR: Microsoft Outlook Chaos Unleashed — Live Technical Analysis of New Vulnerabilities
arrow-white arrow-white Secure your spot

News & EventsThe Latest From Morphisec

Media Coverage

April 4, 2018

Watering hole computer attack strategies resurface

A hacking technique - watering hole attacks - has resurfaced for the first time since 2015/16. Morphisec's CTO and malware prevention expert, Michael Gorelik, says it's back and more sophisticated than before, and will be the big thing in 2018.

Read More
March 26, 2018

Watering Hole Attack Exploits North Korea's Flash Flaw

An attack leveraging the compromised website of a Hong Kong telecommunications company is using a recently patched Flash vulnerability that has been exploited by North Korea since mid-November 2017, Morphisec warns.

Read More
March 8, 2018

CIGslip Lets Attackers Bypass Microsoft Code Integrity Guard

A new attack method lets attackers bypass Microsoft's Code Integrity Guard (CIG) and inject malicious code into protected processes, including Microsoft Edge. Researchers at Morphisec this week disclosed the details of the technique and proof-of-concept code.

Read More
March 7, 2018

CIGslip Attack Bypasses Windows Code Integrity Guard (CIG)

Malware authors can exploit a flaw in the Windows Code Integrity Guard (CIG) security mechanism to inject malicious, unsigned code into CIG-protected applications, considered to be immune to such attacks.

Read More
March 5, 2018

Six Recently Funded Israeli Startups You Need To Know

Every month, Start-Up Nation Central’s channel on Forbes will highlight a handful of startups that have recently raised funding, and that we think are important to keep an eye on.

Read More
February 28, 2018

Recent Flash Zero-Day Flaw Now Exploited in Widespread Attacks

A vulnerability that was recently patched in Flash Player after being used in targeted attacks is now seeing widespread exploitation in a malicious spam campaign.

Read More
February 27, 2018

Massive Malspam Campaign Targets Unpatched Systems

According to cybersecurity firm Morphisec, cybercriminals are blasting spam messages that urge recipients to click a link to download a Word document. And when a victim opens the document and enables editing, malware attempts to exploit an Adobe Flash Player bug (CVE-2018-4878) patched by Adobe earlier this month.

Read More
February 26, 2018

North Korea’s Flash Player Flaw Now Exploited by Cybercriminals

Endpoint security firm Morphisec has spotted a massive campaign that exploits a recently patched Adobe Flash Player vulnerability to deliver malware.

Read More
February 21, 2018

Term Sheet — Wednesday, February 21

Morphisec, an Israel-based developer of cybersecurity software, raised $12 million in Series B funding. Investors include Orange Digital Ventures, Jerusalem Venture Partners, GE, and Deutsche Telekom.

Read More
February 20, 2018

Orange Digital Ventures investit dans Morphisec, leader de la technologie Moving Target Defense ainsi que dans NGD Systems, pionnier du processing in-situ

Orange Digital Ventures annonce sa participation au financement de Morphisec, leader de la technologie Moving Target Defense.

Read More

SANS Institute's Latest Product Review of Morphisec

SANS Instructor Matt Bromiley reviews Morphisec's moving target defense technology, which is designed to defeat threats such as zero-days, evasive malware, fileless attacks and exploits by morphing process memory.

Watch the webcast

SANS Product Review-18