Virsec Blog
Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.


Zero Day Exploit
Extend Zero-Trust to Legacy Applications and Workloads
Large Attack Vector - Unpatched Application Workloads
Read MoreAll Tags
- Blog (238)
- Security News (126)
- Research Lab (26)
- Cybersecurity (24)
- Cyber Attack (22)
- application aware workload protection (17)
- application aware protection (15)
- runtime protection (14)
- Cyber Security (12)
- Ransomware (10)
- Remote Code Execution (9)
- SolarWinds (8)
- Cloud Security (7)
- Cyber Resilience (6)
- Deterministic Protection (6)
- Vulnerability (6)
- Apache (5)
- DPP (5)
- Deterministic Protection Platform (5)
- ICS/SCADA (4)
- Microsoft (4)
- CEO (3)
- Protect Application Workloads (3)
- Public Sector (3)
- RCE Attack (3)
- Zero Trust (3)
- Zero-Day Exploit (3)
- industrial control system (3)
- software (3)
- EPP/EDR (2)
- Kaseya supply chain ransomware attack (2)
- Microsoft Windows (2)
- National Vulnerability Database (2)
- Patching (2)
- PrintNightmare vulnerability (2)
- SolarWinds Attack (2)
- hack (2)
- legacy applications (2)
- security best practices (2)
- Acer Ransomware Attack (1)
- Buffer Overflow (1)
- CIO (1)
- CISA (1)
- CVE (1)
- Carahsoft (1)
- Code Injection (1)
- Container Protection (1)
- Endpoint Security (1)
- Exchange (1)
- Gartner (1)
- Government (1)
- Hafnium (1)
- IBM (1)
- MS Exchange Attack (1)
- Malicious Attacks (1)
- Malware (1)
- Memory Protection (1)
- PCI Compliance (1)
- Partnerships (1)
- Printers (1)
- ProxyNotShell (1)
- REvil ransomware (1)
- SEC (1)
- SSRF (1)
- Spring4Shell (1)
- Supply Chain Disruption (1)
- Threat Intelligence (1)
- Virsec Security Platform (1)
- Virsec Security Research Lab (1)
- Vulnerability Analysis (1)
- Water Utility Attack (1)
- WordPress (1)
- billington cybersecurity summit (1)
- compliance (1)
- information security (1)
- log4j (1)
- regulatory (1)
- software vulnerabilities (1)
- state government (1)
- stealth memory-based attacks (1)
Insights
Leave No Apps Behind: Protection from Legacy to Cloud to Containers
Most enterprises are running a mix of new and old applications and platforms. This includes legacy apps that can’t be easily retired and cutting-edge..
Insights
Eliminate Blind Spots: Protect the Full Application Stack
If you lock your front door but leave a basement window open, that’s where the burglars will go. Similarly, placing a shiny new padlock on a front..
Insights
Prepare for a Different Fight: Runtime Is the New Battleground
You can’t stop what you can’t see. And attackers have found an area to exploit that conventional cyber security tools cannot see. This area is..
Insights
Change Your Thinking: Turn Conventional Security Inside Out
In medieval days, knights in shining armor could defend the drawbridge as the main point of entry to the castle. Under fierce siege, the king could..
Insights
The Ransomware Tsunami Continues Slamming Healthcare & Banks
2020 continues to dish out unforeseen difficulties and challenges, many at devastating levels. In the realm of cybersecurity, it’s been no different.
Insights
How to Ensure Your Company Is Protected from Ransomware Attacks
Brilliance Security Magazine, May 21, 2020, Article by Willy Leichter, Virsec
Read full How to Ensure Your Company is Protected from Ransomware..
Insights
Lucifer Malware Hits Unpatched Windows Systems
Another new malware is on the scene, discovered by Unit 42 security researchers at Palo Alto Networks.
Lucifer malware attacks a Windows..
Insights
Most Employees Would Enjoy Working from Home (WFH) Long Term
Living through a pandemic is fraught with difficulty, but one thing is clear. For people fortunate enough to have the option of working from home,..
Insights
New Malware Hides Inside Rogue Virtual Machines
Data Center Knowledge, June 2, 2020, with comments from Satya Gupta.
Security experts identify a new worrisome threat vector, but not all of them..