Security Innovation: Secure Systems Start with Foundational Hardware

Threat Post – Threat Post – LIVE EVENT, MONDAY JULY 11: Join Threatpost and Intel Security’s Tom Garrison in a live conversation about innovation enabling stakeholders to stay ahead of…

Zero-Day ‘Follina’ Bug Lays Microsoft Office Open to Attack

Threat Post – Threat Post – Malware loads itself from remote servers and bypasses Microsoft’s Defender AV scanner, according to reports. UPDATE A zero-day vulnerability in Microsoft Office allows adversaries…

SYK Crypter Distributing Malware Families Via Discord

With 50% more users last year than in 2020, the number of people using the community chat platform Discord is growing at a blistering pace. This has led cybercriminals to…

VMWare Identity Manager Attack: New Backdoor Discovered

Morphisec is a world leader in preventing evasive polymorphic threats launched from zero-day exploits. On April 14 and 15, Morphisec identified exploitation attempts for a week-old VMware Workspace ONE Access…

CaddyWiper Analysis: New Malware Attacking Ukraine

As Russia’s invasion of Ukraine continues, new wiper malware has surfaced attacking Ukrainian infrastructure. Caddywiper was first detected on March 14, 2022. It destroys user data, partitions information from attached…

Remcos Trojan: Analyzing the Attack Chain

Morphisec Labs has detected a new wave of Remcos trojan infection. The theme of the phishing emails is again financial, this time as payment remittances sent from financial institutions. The…

New JSSLoader Trojan Delivered Through XLL Files

Morphisec Labs has observed a new wave of JSSLoader infections this year. We’ve tracked JSSLoader activity since December 2020 and published a thorough report on the Russian criminal hacking group…

NFT Buyers Beware: Journey of a Crypto Scammer and How to Stop Them

With examples changing hands for up to $69 million, hosting digital content on blockchain and selling it to investors has become one of the most lucrative things creators can do.…

LockBit, BlackCat, Swissport, Oh My! Ransomware Activity Stays Strong

Threat Post – Threat Post – However, groups are rebranding and recalibrating their profiles and tactics to respond to law enforcement and the security community’s focus on stopping ransomware attacks.…

Log4j Exploit Targets Vulnerable Unifi Network Application (Ubiquiti) at Risk

As a continuation to our previously published blog post on a VMWare Horizon being targeted through the log4j vulnerability, we now identified Unifi Network applications being targeted in a similar…