Virsec Blog
Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.


CEO
Deterministic Protection: Shifting to the New Normal for Cloud Security
Cyber-attacks have become increasingly complex where actors exploit systems at the core to obtain control of software, applications, and workloads –...
Read MoreAll Tags
- Blog (237)
- Security News (126)
- Research Lab (26)
- Cybersecurity (23)
- Cyber Attack (21)
- application aware workload protection (17)
- application aware protection (15)
- runtime protection (14)
- Cyber Security (10)
- Ransomware (9)
- Remote Code Execution (8)
- SolarWinds (8)
- Cloud Security (7)
- Cyber Resilience (6)
- Deterministic Protection (6)
- Apache (5)
- DPP (5)
- Deterministic Protection Platform (5)
- Vulnerability (5)
- ICS/SCADA (4)
- CEO (3)
- Public Sector (3)
- RCE Attack (3)
- industrial control system (3)
- software (3)
- EPP/EDR (2)
- Kaseya supply chain ransomware attack (2)
- Microsoft (2)
- National Vulnerability Database (2)
- Patching (2)
- PrintNightmare vulnerability (2)
- Protect Application Workloads (2)
- SolarWinds Attack (2)
- Zero Trust (2)
- hack (2)
- security best practices (2)
- Acer Ransomware Attack (1)
- Buffer Overflow (1)
- CIO (1)
- CISA (1)
- Carahsoft (1)
- Code Injection (1)
- Container Protection (1)
- Endpoint Security (1)
- Exchange (1)
- Gartner (1)
- Government (1)
- Hafnium (1)
- IBM (1)
- MS Exchange Attack (1)
- Malware (1)
- Memory Protection (1)
- Microsoft Windows (1)
- PCI Compliance (1)
- Partnerships (1)
- Printers (1)
- REvil ransomware (1)
- SEC (1)
- SSRF (1)
- Spring4Shell (1)
- Supply Chain Disruption (1)
- Threat Intelligence (1)
- Virsec Security Research Lab (1)
- Vulnerability Analysis (1)
- Water Utility Attack (1)
- WordPress (1)
- Zero-Day Exploit (1)
- billington cybersecurity summit (1)
- compliance (1)
- information security (1)
- legacy applications (1)
- log4j (1)
- regulatory (1)
- software vulnerabilities (1)
- state government (1)
- stealth memory-based attacks (1)
Insights
Eliminate Blind Spots: Protect the Full Application Stack
If you lock your front door but leave a basement window open, that’s where the burglars will go. Similarly, placing a shiny new padlock on a front..
Insights
Prepare for a Different Fight: Runtime Is the New Battleground
You can’t stop what you can’t see. And attackers have found an area to exploit that conventional cyber security tools cannot see. This area is..
Insights
Change Your Thinking: Turn Conventional Security Inside Out
In medieval days, knights in shining armor could defend the drawbridge as the main point of entry to the castle. Under fierce siege, the king could..
Insights
The Ransomware Tsunami Continues Slamming Healthcare & Banks
2020 continues to dish out unforeseen difficulties and challenges, many at devastating levels. In the realm of cybersecurity, it’s been no different.
Insights
How to Ensure Your Company Is Protected from Ransomware Attacks
Brilliance Security Magazine, May 21, 2020, Article by Willy Leichter, Virsec
Read full How to Ensure Your Company is Protected from Ransomware..
Insights
Lucifer Malware Hits Unpatched Windows Systems
Another new malware is on the scene, discovered by Unit 42 security researchers at Palo Alto Networks.
Lucifer malware attacks a Windows..
Insights
Most Employees Would Enjoy Working from Home (WFH) Long Term
Living through a pandemic is fraught with difficulty, but one thing is clear. For people fortunate enough to have the option of working from home,..
Insights
New Malware Hides Inside Rogue Virtual Machines
Data Center Knowledge, June 2, 2020, with comments from Satya Gupta.
Security experts identify a new worrisome threat vector, but not all of them..
Insights
New Malware Makes Air-Gapped Data Center Networks Less Bulletproof
Data Center Knowledge, June 2, 2020, with comments by Satya Gupta
An advanced cyber-espionage group is designing malware that can “jump” across air..