Toggle navigation
Morphick Cyber Security
Managed Detection & Response
Managed Detection & Response
Managed EDR
Morphick Defense Platform
Visibility
Detection
Tailored Threat Intelligence
Learn & Morph
The Morphick Difference
Professional Services
Incident Response Services
MEDR Compromise Assessment
Threat Hunting / Malware
Security Defense Assessment
Company
Meet the Team
Careers
Resources
Blog
Videos
Facing Cyber Threats
Upcoming Events
Contact
Filter by Resource Type:
All
News
Videos
All
News
Videos
Filter by Category:
ALL
Book
EDR
Endgame
Endpoint
Events
FacingCyberThreatsHeadOn
MDR
MEDR
Managed Detection & Response
Managed Detection and Response
ManagedDetectionandResponse
ManagedEndpointDetectionandResponse
News
Phishing
PressRelease
RSA
ReverseEngineer
ThreatIntelligence
Webinar
detection
eternal blue
forrester
infosec
malware
ransomware
security
trends
video
wannacry
ALL
Book
EDR
Endgame
Endpoint
Events
FacingCyberThreatsHeadOn
MDR
MEDR
Managed Detection & Response
Managed Detection and Response
ManagedDetectionandResponse
ManagedEndpointDetectionandResponse
News
Phishing
PressRelease
RSA
ReverseEngineer
ThreatIntelligence
Webinar
detection
eternal blue
forrester
infosec
malware
ransomware
security
trends
video
wannacry
Meet Morphick at BlackHat in L…
Let’s talk about how to keep you one step ahead of the attacker at the Black Hat Conference, July 26 and 27 at the…
News
Learn More
Catching Petya: How Endgame Pr…
Throughout the day, news spread of a ransomware attack hitting Europe and Russia, before making its way into the United…
News
Learn More
CSO Online: CIOs and CISOs are…
“Unprepared organizations, when notified of a breach by external entities such as the FBI, are increasingly employing…
News
Learn More
Protect your organization from…
Offsite/offline backups – Performing consistent backups has long been a part of IT best practices and for good reason…
News
Learn More
On Demand Webinar – Is your MD…
As the fallout from the WannaCry ransomware attack continues, CISOs and security teams globally are grappling with the…
News
Learn More
Detect and prevent attacks lik…
The WannaCry attack is unique because it is the first time the public is seeing ransomware succeed at scale. Previous…
News
Learn More
Credit Union Times: Google Doc…
Experts reacted to a Google Docs phishing attack that hijacked Gmail accounts and spammed contact lists. Google shut…
News
Learn More
Webinar: 2017 Trends in Servic…
Summary 70% of organizations with a “mega budget” for security have still suffered one or more breaches. Why? Security…
Videos
Learn More
Business Courier – Fast-growin…
The firm recently moved into its new headquarters after operating out of temporary space at 4555 Lake Forest Drive. The…
News
Learn More
RSA 2017 – Facing Cyber Threat…
At RSA 2017, SecureNinjaTV caught up with author Brian Minick to discuss his thoughts on cybersecurity, and his new…
Videos
Learn More
Managed Detection and Response…
The Morphick Managed Detection and Response (MDR) Service provides organizations with the ability to effectively…
Videos
Learn More
Deep Dive on the DragonOK Ramb…
Summary: Recent new reporting was released on the DragonOK group which unveiled the many versions of the Sysget…
News
Learn More
Endgame and Morphick: Closing…
In my recently released book Facing Cyber Threats Head On, I spend a lot of time discussing how contemporary cyber…
News
Learn More
On Demand Webinar – Three Cons…
Summary Defensive security technologies increasingly fail to prevent advanced attackers from gaining access to…
News
Learn More
Morphick and Endgame Launch Ad…
Alliance to help reduce strain on organizations to retain and train expert security talent Cincinnati, OH &…
News
Learn More
Learn and Morph with Morphick
Morphick’s Managed Detection and Response Service not only detects and responds to attacks, but creates Morphing…
Videos
Learn More
Visibility with Morphick
You can’t catch what you can’t see. Morphick’s goal is to deliver Managed Detection and Response Services that protect…
Videos
Learn More
Managed Detection and Response…
Managed Detection and Response is an outcome based service that focuses on detecting and responding to attacks. The…
Videos
Learn More
MiKey – A Linux keylogger
Linux malware is slowly becoming more popular. Within the past couple years there were several major incidents…
News
Learn More
Facing Cyber Threats Head On
Facing Cyber Threats Head On Protecting Yourself and Your Business ABOUT PREFACE INTRODUCTION…
Learn More
KLRD Keylogger
Symantec released a report in the beginning of October that talks about Odinaff, which is a new piece of malware used…
News
Learn More
How deep of analysis can a SOC…
How accurate of a story can an analyst present without having everything in front of them? (In this case, everything…
News
Learn More
Morphick’s Cybersecurity Servi…
Cincinnati, OH – Morphick®, the industry leader in incident response as well as the Managed Detection and Response (MDR…
News
Learn More
ScanPOS, new POS malware being…
Just in time for the holidays, a brand new Point Of Sale (POS) malware family has been discovered. Morphick…
News
Learn More
Hundter’s Keylogger
Tying malware back to its earlier versions gives us the ability to look at more rudimentary versions of the code. The…
News
Learn More
Incident Response is a Team Sp…
Responding to and recovering from a cyber security incident is often one of the most challenging events an organization…
News
Learn More
Monster in your Pocket. Simple…
The mobile device sector has become a target rich environment, and attackers favor the way of least resistance. As…
News
Learn More
A Closer Look at Hancitor
Hancitor is a popular dropper used in phishing campaigns. It’s often associated with dropping vawtrak and pony….
News
Learn More
The Benign True Positive Chall…
Recently, we posted an example of something we see a lot at Morphick; we have come to call them “benign true…
News
Learn More
True Positive False Positive
False positives are an everyday occurrence for analysts. To an analyst, a false positive, while sometimes time…
News
Learn More
Morphick Recognized as a Repre…
CINCINNATI — Gartner recently released a new market guide for Managed Detection and Response “MDR” services. “MDR…
News
Learn More
Identify and prioritize busine…
Company leaders worldwide are constantly asked to improve the performance and security of their businesses. I was asked…
News
Learn More
What is Analytical Pivoting™?
I have always liked a good heist movie. Ocean’s Eleven, The Italian Job, The Great Train Robbery, there are a ton of…
News
Learn More
Writing a Malware Config Parse…
Radare2 has been receiving a lot of attention lately. Rather than browsing through some of the documentation, I…
News
Learn More
BernhardPOS – New POS Malware…
Yet another new credit card dumping utility has been discovered. BernhardPOS is named after (presumably) its…
News
Learn More
TrueCrypt’s Egress
Security stories have taken on new life in our post-Snowden information security world. Truth is stranger than…
News
Learn More
LogPOS – New Point of Sale Mal…
Introduction There has been an explosion in POS malware in the last year. At Morphick, Nick Hoffman and I found…
News
Learn More
Webshells and MOF
(Note: If you would prefer a less technical summary, check out Chinese and Russian Attackers Hide In Plain…
News
Learn More
The Mozart RAM Scraper
As a reverse engineer on the Morphick Cyber Security team, I spend a large part of my time pulling apart and…
News
Learn More
From the back room to the boar…
Security has become an important topic in the boardroom and based on consistent news of new data breaches, that will…
News
Learn More
Morphick releases free tool to…
Morphick Cyber Security is seeing a dramatic increase in the number of companies receiving malicious emails trying to…
News
Learn More
Are your defenses advanced and…
Catching an advanced attack is hard. It’s even harder to catch the second, third, or fourth attack. Advanced…
News
Learn More
How do the big guys do cyber s…
It may seem hard to remember, but several years ago data breaches were not regularly in the news. There were only…
News
Learn More
DefCon Reminds Us That There A…
Covering this year’s DefCon, NBC Nightly News sat down with attendees to find out what all could be hacked. As…
News
Learn More
Chinese and Russian Attackers…
Morphick’s Threat Intelligence Team identified a novel technique for maintaining persistence on a remote machine…
News
Learn More
"Malware-less" Attac…
There have been several articles in the last few months addressing the topic of “malware-less” or “malware-free”…
News
Learn More
Separating truth from F.U.D. P…
In the first two posts (Separating truth from F.U.D. Part 1 and Separating truth from F.U.D. Part 2) we…
News
Learn More
Separating truth from F.U.D. P…
In the first post in this series on Separating truth from F.U.D., I discussed how my experiences taught me that the new…
News
Learn More
OPM and Anthem Breaches
There has been much reporting that the data breaches at Anthem, and more recently the U.S. Office of Personnel…
News
Learn More
Separating truth from F.U.D. P…
With so many voices now speaking about cyber security and even more technologies and solutions entering the market, I…
News
Learn More
Bringing Sanity to Threat Inte…
This post was inspired by an article I read the other day that highlighted something which struck a chord, “[m]…
News
Learn More
Compliance vs Security
At the end of the day, what exactly is cyber security and what falls within the scope of a cyber security program? We…
News
Learn More
Gamification of your Global In…
This presentation, originally made by Kevin and Kody McLaughlin at RSA 2015, shows how the Whirlpool Corporation and…
News
Learn More
Importance of a Complete Detec…
When defending against cyber attacks and trying to avoid being hacked, there are a number of things to consider….
News
Learn More
Consumerization of Hacking
When dealing with technology, there is at least one thing that is universally true: what was once difficult and…
News
Learn More
Morphick Defense
Cyber security is a rapidly changing space. Traditionally, it has focused on stopping viruses or malicious programs…
News
Learn More
A Cyber Security Reality Check
You might be skeptical if you heard that a strong cyber security defense focuses on people and processes over…
News
Learn More
Automated Solutions Are Not En…
Advanced Persistent Threats are successful because of IT security vendors. OK, so maybe that’s a bit strong. I am…
News
Learn More
What is Intelligent Analysis a…
Successful cyber-attacks do not just happen. There are a series of steps that an attacker has to go through before they…
News
Learn More
An Evening With N3utrino
Introduction In my previous post I showed off some tricks that malware authors use to check to see if they are being…
News
Learn More
VM Checking and Detecting
I recently noticed a new piece of malware that had made its way into the database. The part that stuck out to me is…
News
Learn More
LusyPOS and Tor
At our day jobs, as reverse engineers at Morphick, Jeremy and I have been hunting new POS malware. A new sample…
News
Learn More
Curious Korlia
Reverse engineers organize discrete of pieces of malware into families. While digging through my malware collection I…
News
Learn More
Network Traffic Anomaly Analys…
Intrusion Detection Systems are a powerful tool in the fight against threats to the network. Just like any tool,…
News
Learn More
Operational Intelligence
In my last blog post I discussed the importance of strategic intelligence to the enterprise. To quickly sum it up…
News
Learn More
Strategic Intelligence
As an intelligence analyst supporting USAF acquisitions, it was my job to make the acquisition program managers aware…
News
Learn More
Sign Up for News
Email Address
Company
Meet the Team
Careers