How to Stop Ransomware: Breach Prevention vs. Cobalt Strike Backdoor

With a year-on-year increase of over 161%, malicious usage of cracked versions of Cobalt Strike (a legitimate penetration test tool) is skyrocketing. For organizations that still rely on signature-based next…

Protecting Against the Log4j (Log4Shell) Vulnerability – What is it & What Actions Can You Take?

On December 9th, 2021, reports surfaced about a new zero-day vulnerability, termed Log4j (Log4Shell), impacting Minecraft servers. Now, almost one week later, it is clear that countless millions of devices…

Ransomware Alert! Why AV and EDR are Failing and How to Better Secure your Company

Ransomware attacks are soaring. By the end of this year, the global costs incurred by ransomware will be more than $20 billion annually – 57 times what they were in…

The BABADEDA Crypter – an Emerging Crypter targeting the Crypto, NFT, and DeFi communities

INTRODUCTION The cryptocurrency market is now worth more than $2.5 trillion. Unfortunately, this fact is not lost on threat actors. As well as using cryptocurrency themselves to extract ransoms, cybercriminals…

The Notorious Emotet Is Back: What Organizations Need to Know

Almost a year after an international law enforcement effort supposedly defeated it, Emotet, aka “the world’s most dangerous botnet,” has returned. Earlier this week, German security researcher Luca Ebach reported…

10 Tips To Boost Microsoft Defender AV Security

Microsoft Defender Antivirus (MDAV), known as Windows Defender Antivirus before the Windows 10 May 2020 update, is an anti-malware component of Microsoft Windows. MDAV continually scans for malware, viruses, and…

DECAF Ransomware: A New Golang Threat Makes Its Appearance

Key Points The Go language is becoming increasingly popular among threat actors, with attacks starting to appear in 2019 Morphisec Labs has tracked a new Golang-based (1.17) ransomware variant that…

What is a data breach & how to prevent one?

What is a data breach? A data breach is a security lapse where a non-authorized person can assess sensitive information without authorization. Let’s dig deeper into data breach prevention measures.…

Taking Breach Prevention to the Next Level with Morphisec

A successful security breach brings with it a host of legal and financial ramifications, including cleanup costs paid to remediation vendors and possible penalties from the exfiltration of sensitive data.…

Unwanted Gift: Ransomware, Supply Chain Attacks, and How to Prevent Them

Now more than ever, supply chains are attracting threat actor attention. As evidenced by attacks like the one which recently targeted the IT services provider Kaseya and over 1,500 of…