Cybersecurity Tech Investment Planning: Use annual loss expectancy to build a business case
arrow-white arrow-white Download now
close

News & EventsThe Latest From Morphisec

Media Coverage

February 3, 2022

This gang has been evolving it’s methods to attack your system

The operators of the SolarMarker information stealer and backdoor have been discovered using subtle ways to create long-term persistence on compromised computers, indicating that threat actors are constantly changing tactics and updating their defensive mechanisms.

Read More
February 2, 2022

Critical firmware bugs found in products from major IT manufacturers

Critical firmware bugs found in products from major IT manufacturers, another WordPress plugin vulnerability found, and this is Identity Theft Awareness Week.

Read More
February 2, 2022

Log4j Puts Vulnerable Ubiquiti Network Applications at Risk

Critical Vulnerability Enables Malicious Actors to Control Applications

Read More
February 2, 2022

Hybrid war & Ukraine. White Tur borrows from many APTs. Charming Kitten's new claws. Trickbot still has its letter of marque?

Russian President Putin held his promised news conference yesterday, the New York Times reports. The crisis over Ukraine, he said, is a provocation entirely made in America. “[The Americans'] most important task is to contain Russia’s development. Ukraine is just an instrument of achieving this goal. It can be done in different ways, such as pulling us into some armed conflict and then forcing their allies in Europe to enact those harsh sanctions against us that are being discussed today in the United States.”

Read More
February 2, 2022

Cutting-Edge Techniques Employed by SolarMarker Malware to Survive on Hacked Computers

The SolarMarker information stealer and backdoor operators have been discovered using sneaky Windows Registry methods to create long-term persistence on compromised devices, hinting that threat actors are consistently changing tactics and updating their defensive tools. Despite the operation’s drop in November 2021, the remote access implants are still found on targeted networks, according to cybersecurity company Sophos, which spotted the new behavior.

Read More
February 1, 2022

Hybrid war. US agencies warn of criminal and espionage threats. Ransomware and OT. Ramnit, again. Scalping bots hit NFTs.

Yesterday's UN Security Council meeting over the Russian threat to Ukraine was marked by acrimony and small progress toward any resolution (the Washington Post describes the sharp exchanges) but negotiations over the crisis continue today on a bilateral basis as US Secretary of State Blinken talks with Russian Foreign Minister Lavrov.

Read More
February 1, 2022

SolarMarker Malware Uses Novel Techniques to Persist on Hacked Systems

In a sign that threat actors continuously shift tactics and update their defensive measures, the operators of the SolarMarker information stealer and backdoor have been found leveraging stealthy Windows Registry tricks to establish long-term persistence on compromised systems.

Read More
January 31, 2022

Malware News Technology Threat actor target Ubiquiti network appliances using Log4Shell exploits

Threat actors are using a customized public exploit for the Log4Shell vulnerability to attack and take over Ubiquiti network appliances running the UniFi software, security firm Morphisec said in a report last week.

Read More
January 31, 2022

Hybrid war, diplomacy, and sanctions. Ransomware-as-a-service. Social engineering attacks in progress.

Russian cyberattacks continue to afflict targets in Ukraine even as Russian conventional forces remain poised in assembly areas. US Secretary of Defense Austin and Chairman of the Joint Chiefs of Staff Milley said late last week that, while intentions remained "opaque," Russia's capabilities were up to a damaging invasion of Ukraine.

Read More
January 28, 2022

Programmers Using New Evasive Technique to Deliver AsyncRAT Malware

A new, complex phishing assault has been noticed conveying the AsyncRAT trojan as a component of a malware crusade that is accepted to have been initiated in September 2021.

Read More

SANS Institute's Latest Product Review of Morphisec

SANS Instructor Matt Bromiley reviews Morphisec's moving target defense technology, which is designed to defeat threats such as zero-days, evasive malware, fileless attacks and exploits by morphing process memory.

Watch the webcast

SANS Product Review-18