Resources »
Facing Cyber Threats Head On, the new book from Brian Minick

Facing Cyber Threats Head On looks at cyber security from a business leader perspective. By avoiding deep technical explanations of “how” and focusing on the “why” and “so what,” this book guides readers to a better understanding of the challenges that cyber security presents to modern business, and shows them what they can do as leaders to solve these challenges.

Meet Morphick at BlackHat in Las Vegas! Booth 1659 First Floor - Mandalay Bay
Meet Morphick at BlackHat in L…
Let’s talk about how to keep you one step ahead of the attacker at the Black Hat Conference, July 26 and 27 at the…
News
Learn More
 
Targeted Malware Ransomware
Catching Petya: How Endgame Pr…
Throughout the day, news spread of a ransomware attack hitting Europe and Russia, before making its way into the United…
News
Learn More
 
CSO Online
CSO Online: CIOs and CISOs are…
“Unprepared organizations, when notified of a breach by external entities such as the FBI, are increasingly employing…
News
Learn More
 
Protect your organization from ransomware
Protect your organization from…
Offsite/offline backups – Performing consistent backups has long been a part of IT best practices and for good reason…
News
Learn More
 
Is your MDR protecting you from WannaCry Ransomware
On Demand Webinar – Is your MD…
As the fallout from the WannaCry ransomware attack continues, CISOs and security teams globally are grappling with the…
News
Learn More
 
Reconnaissance. Weaponization. Delivery. Exploitation. Installation. Command and control. Action on objectives.
Detect and prevent attacks lik…
The WannaCry attack is unique because it is the first time the public is seeing ransomware succeed at scale. Previous…
News
Learn More
 
Credit Union Times: Google Docs Phished Under OAuth, Door Opened to Copycat Attacks
Credit Union Times: Google Doc…
Experts reacted to a Google Docs phishing attack that hijacked Gmail accounts and spammed contact lists. Google shut…
News
Learn More
 
Morphick and Forrester webinar - 2017 Trends in Services and Security
Webinar: 2017 Trends in Servic…
Summary 70% of organizations with a “mega budget” for security have still suffered one or more breaches. Why? Security…
Videos
Learn More
 
Fast-growing Morphick planting its roots in Blue Ash
Business Courier – Fast-growin…
The firm recently moved into its new headquarters after operating out of temporary space at 4555 Lake Forest Drive. The…
News
Learn More
 
Morphick CEO Brian Minick discusses his new book on SecureNinjaTV
RSA 2017 – Facing Cyber Threat…
At RSA 2017, SecureNinjaTV caught up with author Brian Minick to discuss his thoughts on cybersecurity, and his new…
Videos
Learn More
 
Managed Detection and Response in less than 2 minutes
Managed Detection and Response…
The Morphick Managed Detection and Response (MDR) Service provides organizations with the ability to effectively…
Videos
Learn More
 
Deep Dive On The DragonOK Rambo Backdoor
Deep Dive on the DragonOK Ramb…
Summary: Recent new reporting was released on the DragonOK group which unveiled the many versions of the Sysget…
News
Learn More
 
Endgame and Morphick: Closing the gap in advanced cyber threat response
Endgame and Morphick: Closing…
In my recently released book Facing Cyber Threats Head On, I spend a lot of time discussing how contemporary cyber…
News
Learn More
 
Join Morphick and Endgame for a webinar to learn effective strategies to detect and eliminate advanced threats in your Enterprise.
On Demand Webinar – Three Cons…
Summary Defensive security technologies increasingly fail to prevent advanced attackers from gaining access to…
News
Learn More
 
Morphick and Endgame Launch Advanced Managed Endpoint Detection & Response
Morphick and Endgame Launch Ad…
Alliance to help reduce strain on organizations to retain and train expert security talent Cincinnati, OH &…
News
Learn More
 
Learn and Morph with Morphick
Learn and Morph with Morphick
Morphick’s Managed Detection and Response Service not only detects and responds to attacks, but creates Morphing…
Videos
Learn More
 
The importance of a complete cyber detection tool kit
Visibility with Morphick
You can’t catch what you can’t see. Morphick’s goal is to deliver Managed Detection and Response Services that protect…
Videos
Learn More
 
Brian Minick
Managed Detection and Response…
Managed Detection and Response is an outcome based service that focuses on detecting and responding to attacks. The…
Videos
Learn More
 
MiKey - A linux keylogger
MiKey – A Linux keylogger
Linux malware is slowly becoming more popular.  Within the past couple years there were several major incidents…
News
Learn More
 
Facing Cyber Threats Head On
Facing Cyber Threats Head On
Facing Cyber Threats Head On Protecting Yourself and Your Business ABOUT PREFACE INTRODUCTION…
Learn More
 
Morphick Intelligence Analysts wanted to take a closer look at some of these binaries and post some analysis so that network defenders can better understand how these tools work.
KLRD Keylogger
Symantec released a report in the beginning of October that talks about Odinaff, which is a new piece of malware used…
News
Learn More
 
How deep of analysis can a SOC analyst actually provide?
How deep of analysis can a SOC…
How accurate of a story can an analyst present without having everything in front of them? (In this case, everything…
News
Learn More
 
Morphick's Iterative Incident Response approach catches the full extent of the attack
Morphick’s Cybersecurity Servi…
Cincinnati, OH – Morphick®, the industry leader in incident response as well as the Managed Detection and Response (MDR…
News
Learn More
 
ScanPOS: new POS Malware distributing Kronos
ScanPOS, new POS malware being…
Just in time for the holidays, a brand new Point Of Sale (POS) malware family has been discovered.  Morphick…
News
Learn More
 
Hundter’s Keylogger
Tying malware back to its earlier versions gives us the ability to look at more rudimentary versions of the code. The…
News
Learn More
 
Incident Response is a Team Sport
Incident Response is a Team Sp…
Responding to and recovering from a cyber security incident is often one of the most challenging events an organization…
News
Learn More
 
Simple ways to secure your mobile devices
Monster in your Pocket. Simple…
The mobile device sector has become a target rich environment, and attackers favor the way of least resistance. As…
News
Learn More
 
A Closer Look at Hancitor
A Closer Look at Hancitor
Hancitor is a popular dropper used in phishing campaigns.  It’s often associated with dropping vawtrak and pony….
News
Learn More
 
The Benign True Positive Chall…
Recently, we posted an example of something we see a lot at Morphick; we have come to call them “benign true…
News
Learn More
 
True Positive False Positive
False positives are an everyday occurrence for analysts. To an analyst, a false positive, while sometimes time…
News
Learn More
 
Morphick Recognized as a Repre…
CINCINNATI — Gartner recently released a new market guide for Managed Detection and Response “MDR” services. “MDR…
News
Learn More
 
Security Defense Assessment
Identify and prioritize busine…
Company leaders worldwide are constantly asked to improve the performance and security of their businesses. I was asked…
News
Learn More
 
Security Operations Center
What is Analytical Pivoting™?
I have always liked a good heist movie. Ocean’s Eleven, The Italian Job, The Great Train Robbery, there are a ton of…
News
Learn More
 
Writing a Malware Config Parse…
Radare2 has been receiving a lot of attention lately. Rather than browsing through some of the documentation, I…
News
Learn More
 
Exterior image of office building
BernhardPOS – New POS Malware…
Yet another new credit card dumping utility has been discovered.  BernhardPOS is named after (presumably) its…
News
Learn More
 
TrueCrypt’s Egress
Security stories have taken on new life in our post-Snowden information security world.  Truth is stranger than…
News
Learn More
 
LogPOS – New Point of Sale Mal…
Introduction There has been an explosion in POS malware in the last year.  At Morphick, Nick Hoffman and I found…
News
Learn More
 
Targeted Threat Assessment
Webshells and MOF
(Note: If you would prefer a less technical summary, check out Chinese and Russian Attackers Hide In Plain…
News
Learn More
 
The Mozart RAM Scraper
As a reverse engineer on the Morphick Cyber Security team, I spend a large part of my time pulling apart and…
News
Learn More
 
From the back room to the boar…
Security has become an important topic in the boardroom and based on consistent news of new data breaches, that will…
News
Learn More
 
Morphick releases free tool to…
Morphick Cyber Security is seeing a dramatic increase in the number of companies receiving malicious emails trying to…
News
Learn More
 
Are your defenses advanced and…
Catching an advanced attack is hard. It’s even harder to catch the second, third, or fourth attack. Advanced…
News
Learn More
 
How do the big guys do cyber security?
How do the big guys do cyber s…
It may seem hard to remember, but several years ago  data breaches were not regularly in the news. There were only…
News
Learn More
 
DefCon Reminds Us That There A…
Covering this year’s DefCon, NBC Nightly News sat down with attendees to find out what all could be hacked.  As…
News
Learn More
 
Chinese And Russian Attackers Hide In Plain Sight
Chinese and Russian Attackers…
Morphick’s Threat Intelligence Team identified a novel technique for maintaining persistence on a remote machine…
News
Learn More
 
"Malware-less" Attac…
There have been several articles in the last few months addressing the topic of “malware-less” or “malware-free”…
News
Learn More
 
Separating the truth from Fear, Uncertainty, and Doubt (FUD)
Separating truth from F.U.D. P…
In the first two posts (Separating truth from F.U.D. Part 1 and Separating truth from F.U.D. Part 2) we…
News
Learn More
 
Separating the truth from Fear, Uncertainty, and Doubt (FUD)
Separating truth from F.U.D. P…
In the first post in this series on Separating truth from F.U.D., I discussed how my experiences taught me that the new…
News
Learn More
 
OPM and Anthem Breaches
There has been much reporting that the data breaches at Anthem, and more recently the U.S. Office of Personnel…
News
Learn More
 
Separating the truth from Fear, Uncertainty, and Doubt (FUD)
Separating truth from F.U.D. P…
With so many voices now speaking about cyber security and even more technologies and solutions entering the market, I…
News
Learn More
 
Bringing Sanity To Threat Intelligence
Bringing Sanity to Threat Inte…
This post was inspired by an article I read the other day that highlighted something which struck a chord,  “[m]…
News
Learn More
 
Compliance vs Security
At the end of the day, what exactly is cyber security and what falls within the scope of a cyber security program? We…
News
Learn More
 
RSA 2015 Presentation - Gamification of your Global Information Security Operations Center
Gamification of your Global In…
This presentation, originally made by Kevin and Kody McLaughlin at RSA 2015, shows how the Whirlpool Corporation and…
News
Learn More
 
The importance of a complete cyber detection tool kit
Importance of a Complete Detec…
When defending against cyber attacks and trying to avoid being hacked, there are a number of things to consider….
News
Learn More
 
Consumerization of Hacking
When dealing with technology, there is at least one thing that is universally true: what was once difficult and…
News
Learn More
 
Morphick Defense
Cyber security is a rapidly changing space. Traditionally, it has focused on stopping viruses or malicious programs…
News
Learn More
 
A Cyber Security Reality Check
You might be skeptical if you heard that a strong cyber security defense focuses on people and processes over…
News
Learn More
 
Automated Solutions Are Not En…
Advanced Persistent Threats are successful because of IT security vendors. OK, so maybe that’s a bit strong. I am…
News
Learn More
 
Intelligent Analysis and Morphick Defense is an iterative process
What is Intelligent Analysis a…
Successful cyber-attacks do not just happen. There are a series of steps that an attacker has to go through before they…
News
Learn More
 
An Evening With N3utrino
An Evening With N3utrino
Introduction In my previous post I showed off some tricks that malware authors use to check to see if they are being…
News
Learn More
 
VM Checking and Detecting
I recently noticed a new piece of malware that had made its way into the database. The part that stuck out to me is…
News
Learn More
 
Reverse engineering LusyPOS and Tor
LusyPOS and Tor
At our day jobs, as reverse engineers at Morphick, Jeremy and I have been hunting new POS malware. A new sample…
News
Learn More
 
A reverse engineering deep dive on the malware Korlia
Curious Korlia
Reverse engineers organize discrete of pieces of malware into families. While digging through my malware collection I…
News
Learn More
 
Morphick Cyber Security
Network Traffic Anomaly Analys…
Intrusion Detection Systems are a powerful tool in the fight against threats to the network.  Just like any tool,…
News
Learn More
 
Operational cyber intelligence, when properly applied, can guide security teams to posture defenses against a well-defined threat.
Operational Intelligence
In my last blog post I discussed the importance of strategic intelligence to the enterprise.  To quickly sum it up…
News
Learn More
 
Strategic intelligence can reveal the adversary's tools and their specific targets
Strategic Intelligence
As an intelligence analyst supporting USAF acquisitions, it was my job to make the acquisition program managers aware…
News
Learn More