Virsec Blog
Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.


Zero Day Exploit
Extend Zero-Trust to Legacy Applications and Workloads
Large Attack Vector - Unpatched Application Workloads
Read MoreAll Tags
- Blog (238)
- Security News (126)
- Research Lab (26)
- Cybersecurity (24)
- Cyber Attack (22)
- application aware workload protection (17)
- application aware protection (15)
- runtime protection (14)
- Cyber Security (12)
- Ransomware (10)
- Remote Code Execution (9)
- SolarWinds (8)
- Cloud Security (7)
- Cyber Resilience (6)
- Deterministic Protection (6)
- Vulnerability (6)
- Apache (5)
- DPP (5)
- Deterministic Protection Platform (5)
- ICS/SCADA (4)
- Microsoft (4)
- CEO (3)
- Protect Application Workloads (3)
- Public Sector (3)
- RCE Attack (3)
- Zero Trust (3)
- Zero-Day Exploit (3)
- industrial control system (3)
- software (3)
- EPP/EDR (2)
- Kaseya supply chain ransomware attack (2)
- Microsoft Windows (2)
- National Vulnerability Database (2)
- Patching (2)
- PrintNightmare vulnerability (2)
- SolarWinds Attack (2)
- hack (2)
- legacy applications (2)
- security best practices (2)
- Acer Ransomware Attack (1)
- Buffer Overflow (1)
- CIO (1)
- CISA (1)
- CVE (1)
- Carahsoft (1)
- Code Injection (1)
- Container Protection (1)
- Endpoint Security (1)
- Exchange (1)
- Gartner (1)
- Government (1)
- Hafnium (1)
- IBM (1)
- MS Exchange Attack (1)
- Malicious Attacks (1)
- Malware (1)
- Memory Protection (1)
- PCI Compliance (1)
- Partnerships (1)
- Printers (1)
- ProxyNotShell (1)
- REvil ransomware (1)
- SEC (1)
- SSRF (1)
- Spring4Shell (1)
- Supply Chain Disruption (1)
- Threat Intelligence (1)
- Virsec Security Platform (1)
- Virsec Security Research Lab (1)
- Vulnerability Analysis (1)
- Water Utility Attack (1)
- WordPress (1)
- billington cybersecurity summit (1)
- compliance (1)
- information security (1)
- log4j (1)
- regulatory (1)
- software vulnerabilities (1)
- state government (1)
- stealth memory-based attacks (1)
Insights
Sabbath Ransomware Group: Using Memory-Based Attacks to Evade Detection
In a new report this week, Mandiant shared how the recently discovered Sabbath Ransomware group previously went under two other names, Arcane and..
Insights
How to Better Protect Cloud Workloads and Your Crown Jewels
Previously, I discussed how the attack surface is expanding in the cloud and the cloud-native security tools and best practices available to..
Insights
Retail & Ransomware: Tips for a Safer Holiday Retail Season
Despite retailers facing a number of obstacles, from low inventory to staff shortages, the National Retail Federation expects the rise in holiday..
Insights
The CISA Patching Directive: Why a Deterministic Approach is Needed
What Happened
On Wednesday, November 3rd, the Cybersecurity and Infrastructure Security Agency (CISA) issued a directive that orders all federal and..
Insights
5 Best Practices to Reduce the Attack Surface in the Cloud
Over the last 18 months the cloud has gone mainstream. In case you need proof, Gartner forecasts end-user spending on public cloud services to grow..
Insights
Critical Capabilities for Cloud Workload Protection Platforms
The Gartner Market Guide for Cloud Workload Protection Platforms addresses what industry professionals should look for in a cloud workload protection..
Insights
Behind the Scenes: A Conversation with Virsec's CTO of the Year
Several weeks ago, we were thrilled to learn that our Founder and Chief Technology Officer, Satya Gupta, was named CTO of the Year in the 2021 Global..
Insights
Protecting Industrial Control Systems Against Cyberattacks - Part 3
In the third installment of our series, Protecting Industrial Control Systems Against Cyberattacks, we explore additional risk factors and..
Insights
Behind the Scenes: A Conversation with Virsec’s New VP Public Sector
Virsec continues to grow rapidly, attracting top talent and investors alike. We recently announced that Kevin Jones has joined Virsec as VP Public..