RESOURCE LIBRARY

"Reading furnishes the mind only with materials of knowledge; it is thinking that makes what we read ours."
John Locke

FEATURED RESOURCES

Moving Target Defense Ebook

DECEPTION AND COUNTER DECEPTION - MOVING TARGET ATTACKS VS. MOVING TARGET DEFENSE

Cybercriminals arm their malware with polymorphism, obfuscation and self-modification to evade detection. Moving Target Defense leverages the tactics of those Moving Target Attacks to put businesses on equal footing with attackers.

Cyber Security ROI ebook

CYBER SECURITY – KNOW YOUR ROI

MAKING THE BUSINESS CASE FOR CYBER SECURITY.

Every cyber attack – whether targeted or non-targeted – costs the attacked organization dearly. In this ebook we describe those costs, and how a majority of the expenses can be avoided.

Endpoint Security

ENDPOINT SECURITY AS USUAL? THINK AGAIN.

RETHINKING THE SECURITY STACK

The current state of endpoint security is unsustainable. Rather than asking whether to use EDR or some rip-and- replace “NewGen” promise, get down to the real questions.

Dive into some more of our content for you

Solution Brief Endpoint Threat Protection

Solution Brief

Morphisec Endpoint Threat Prevention prevents advanced attacks when and where they happen – at your endpoints and in real time.

ETP Technical Datasheet

Technical Datasheet

Morphisec Endpoint Threat Prevention protects your endpoints from all exploit-based, memory injection attacks.

VDI Security Solution

VDI SECURITY SOLUTION

Morphisec Endpoint Threat Prevention leverages Moving Target Defense technology for a low-profile solution that helps secure your VDI without sacrificing any of its benefits.

Attack Analysis On-Demand

Attack Analysis On-Demand

This service puts Morphisec’s team of cyber professionals to work for you. Gain a deep understanding of the threats your organization faces, when and where you need it.

Analysis of Kovter Attack

Kovter Attack Analysis

Kovter is notorious for its sophistication. Our analysis describes the attack chain in full detail, starting from the emails and ending with the persistent Kovter backdoor.

Hancitor Attack Analysis

Hancitor Attack Analysis

The Hancitor variant recently identified by Morphisec has several modified evasive techniques, most noteworthy are the different API’s for the execution of shellcode.

Andromeda Attack Analysis

Andromeda first appeared in 2011 and still remains popular. This analysis focuses on the packer and deobfuscation, which happens before the malware executes.

Frequently asked questions

FAQ - Get Answers


Got a question?
Check out our FAQs for
some quick answers!

Moving Target Defense compared to EMET

EMET FACTSHEET

EMET and Morphisec address the same problem, preventing exploits. The similarities end there. Here’s a summary of their differences.

What is ASLR

ASLR FACTSHEET

At Morphisec, we view ASLR as the predecessor of our multivariable, modern Moving Target Defense approach.

Watch our Intro

A picture is worth a thousand words; a video is worth a million. Get a fast introduction to what Morphisec is.

CARBANAK - THE GREAT BANK ROBBERY

Watch the video and see how Morphisec prevents the Carbanak attack right at the beginning of the kill chain.