<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=3607898&amp;fmt=gif">

NEWS AND EVENTSThe Latest From Morphisec

MEDIA COVERAGE

March 25, 2022

Hackers Use XLL Files to Deliver Obfuscated Version of JSSLoader

Recently it has been observed that Morphisec Labs has witnessed a new wave of JSSLoader infections this year. 

Read More
February 15, 2022

Supply chain attacks – the new frontier

Since 2020, supply chain attacks have grown exponentially, and innovative mitigation solutions are urgently required.

Read More
February 15, 2022

TA2541: APT Has Been Shooting RATs at Aviation for Years

Since 2017, the attacker has flung simple off-the-shelf malware in malicious email campaigns aimed at aviation, aerospace, transportation and defense.

Read More
February 15, 2022

TA2541: APT Has Been Shooting RATs at Aviation for Years

Researchers have identified an advanced persistent threat (APT) group responsible for a series of cyberespionage and spyware attacks against the aviation, aerospace, transportation and defense industries since at least 2017 that feature high-volume email campaigns using industry-specific lures.

Read More
February 15, 2022

Unskilled hacker linked to years of attacks on aviation, transport sectors

For years, a low-skilled attacker has been using off-the-shelf malware in malicious campaigns aimed at companies in the aviation sector as well as in other sensitive industries. The threat actor has been active since at least 2017, targeting entities in the aviation, aerospace, transportation, manufacturing, and defense industries.

Read More
February 15, 2022

Cybercrime group relentlessly targets aviation and transportation sectors for years

Tracked using the codename of TA2541, the group has been one of the most persistent threats in recent years, even if their attacks have been largely unsophisticated and have relied on infecting and deploying commodity malware on targets’ networks.

Read More
February 15, 2022

NFT Buyers Beware: Journey of a Crypto Scammer and How to Stop Them

With examples changing hands for up to $69 million, hosting digital content on blockchain and selling it to investors has become one of the most lucrative things creators can do. And as rock stars, international artists, and even politicians keep “minting” non-fungible tokens (NFTs) and investors keep rushing in to buy them, the NFT space has undergone exponential growth. 

Read More
February 11, 2022

What is Endpoint Detection, and How Can It Help Your Company?

Endpoint protection or endpoint detection and response (EDR) security solutions collect and analyze threat data from endpoints connected to a network to facilitate real-time identification of malicious events like breaches and attacks. Also, EDR helps companies continuously monitor endpoint devices and respond to detected cyber threats as they occur. Typically, an EDR solution has four primary functions—monitor endpoints, collect threat data, apply data analytics to see threat patterns, deploy automatic responses to mitigate identified threats, and forensics analysis to investigate incidents further. 

Read More
February 4, 2022

Understanding Identity Detection and Response

Identity Detection and Response (IDR) is a new enterprise cybersecurity method

Read More
February 3, 2022

This gang has been evolving it’s methods to attack your system

The operators of the SolarMarker information stealer and backdoor have been discovered using subtle ways to create long-term persistence on compromised computers, indicating that threat actors are constantly changing tactics and updating their defensive mechanisms.

Read More

SANS Institute's Latest Product Review of Morphisec

SANS Instructor Matt Bromiley reviews Morphisec's moving target defense technology, which is designed to defeat threats such as zero-days, evasive malware, fileless attacks and exploits by morphing process memory.

Watch the Webcast

SANS Product Review-18