Blog

Rat Race: ValleyRAT Malware Targets Organizations with New Delivery Techniques

Brad LaPorte | 06 Dec 2024

Fileless Malware Will Beat Your EDR

Fileless Malware
In-Memory Attacks

Brad LaPorte | 17 Oct 2024

Tech Evaluation: Automated Moving Target Defense Research Guide

Automated Moving Target Defense

Brad LaPorte | 25 Nov 2024

2025 Prediction: Preemptive Cyber Defense Will Shake Up Cybersecurity Planning

Preemptive Security

FEATURED BLOGS

Stay up-to-date

Get the latest resources, news, and threat research delivered to your inbox.

Ido Ikar | 19 Dec 2024

Exploiting Trusted Systems: How Adversarial Attacks Can Manipulate EPSS

Continuous Threat Exposure Management (CTEM)
Defense-in-Depth
Preemptive Security

Jay Kurup | 29 Aug 2024

Preventing Threats Before Infiltration: Morphisec AMTD in Action

Automated Moving Target Defense
Defense-in-Depth
Ransomware

Brad LaPorte | 22 Aug 2024

Staying One Step Ahead: The Ultimate Anti-Ransomware Assurance Checklist

Automated Moving Target Defense
Continuous Threat Exposure Management (CTEM)
Defense-in-Depth
Ransomware

Brad LaPorte | 05 Aug 2024

Vital Defense: Ransomware Protection for Healthcare Facilities

Adaptive Exposure Management
Automated Moving Target Defense
Defense-in-Depth
Healthcare Cybersecurity
Ransomware

Brad LaPorte | 29 Jul 2024

EDR Dependency: Ensuring Uninterrupted and Comprehensive Security Coverage Through Service Outages

Automated Moving Target Defense
Continuous Threat Exposure Management (CTEM)
Defense-in-Depth
Gartner

Oren Dvoskin | 03 Aug 2023

Best Practices for Building Defense-in-Depth Layers

Automated Moving Target Defense
Defense-in-Depth

Oren Dvoskin | 05 Jul 2023

Attacks Against OT & Industrial Organizations Are on the Rise

Automated Moving Target Defense
Defense-in-Depth
Legacy Security

Michael Dereviashkin | 15 Feb 2023

Don’t Sleep on the New ProxyShellMiner Campaign

Automated Moving Target Defense
Cybersecurity News
Defense-in-Depth
Morphisec Labs
Threat Research

Michael Gerard | 02 Nov 2022

Servers Aren’t as Secure as You Think

Advanced Threat Defense
Automated Moving Target Defense
Defense-in-Depth
In-Memory Attacks
Linux Security