Virsec Blog
Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.


Zero Day Exploit
Extend Zero-Trust to Legacy Applications and Workloads
Large Attack Vector - Unpatched Application Workloads
Read MoreAll Tags
- Blog (238)
- Security News (126)
- Research Lab (26)
- Cybersecurity (24)
- Cyber Attack (22)
- application aware workload protection (17)
- application aware protection (15)
- runtime protection (14)
- Cyber Security (12)
- Ransomware (10)
- Remote Code Execution (9)
- SolarWinds (8)
- Cloud Security (7)
- Cyber Resilience (6)
- Deterministic Protection (6)
- Vulnerability (6)
- Apache (5)
- DPP (5)
- Deterministic Protection Platform (5)
- ICS/SCADA (4)
- Microsoft (4)
- CEO (3)
- Protect Application Workloads (3)
- Public Sector (3)
- RCE Attack (3)
- Zero Trust (3)
- Zero-Day Exploit (3)
- industrial control system (3)
- software (3)
- EPP/EDR (2)
- Kaseya supply chain ransomware attack (2)
- Microsoft Windows (2)
- National Vulnerability Database (2)
- Patching (2)
- PrintNightmare vulnerability (2)
- SolarWinds Attack (2)
- hack (2)
- legacy applications (2)
- security best practices (2)
- Acer Ransomware Attack (1)
- Buffer Overflow (1)
- CIO (1)
- CISA (1)
- CVE (1)
- Carahsoft (1)
- Code Injection (1)
- Container Protection (1)
- Endpoint Security (1)
- Exchange (1)
- Gartner (1)
- Government (1)
- Hafnium (1)
- IBM (1)
- MS Exchange Attack (1)
- Malicious Attacks (1)
- Malware (1)
- Memory Protection (1)
- PCI Compliance (1)
- Partnerships (1)
- Printers (1)
- ProxyNotShell (1)
- REvil ransomware (1)
- SEC (1)
- SSRF (1)
- Spring4Shell (1)
- Supply Chain Disruption (1)
- Threat Intelligence (1)
- Virsec Security Platform (1)
- Virsec Security Research Lab (1)
- Vulnerability Analysis (1)
- Water Utility Attack (1)
- WordPress (1)
- billington cybersecurity summit (1)
- compliance (1)
- information security (1)
- log4j (1)
- regulatory (1)
- software vulnerabilities (1)
- state government (1)
- stealth memory-based attacks (1)
Insights
You Can Stop Ransomware Attacks, Here’s How
Nearly every day we hear of another ransomware attack against a public or private institution. In fact, the numbers are much higher. In the first..
Insights
The Need to Simplify Compliance Risk Control Implementation
Organizations around the world must fulfill an increasing number of regulatory requirements including NIST, Sarbanes-Oxley Act (SOX), Health..
Insights
The White House Cybersecurity Summit: A Step Forward in the Right Direction
Today the White House hosted a cybersecurity summit to address the rolling headline-making cyberattacks. According to news reports, the federal..
Insights
Defining What it Means to Secure Software in Runtime
The most critical and challenging weakness in cybersecurity is the inability to protect applications, or software, at runtime.
Runtime is a..
Insights
CTO Perspective: Examination of the REvil Ransomware Attack
By Satya Gupta, Founder and CTO, Virsec
Over the July 4th weekend, the REvil ransomware syndicate hit software supplier Kaseya Ltd. and crippled more..
Insights
The truth is no organization is un-hackable. As John Chambers, former CEO of Cisco, and current CEO and founder of JC2 Ventures, stated several years..
Insights
Ransomware: A Thriving Business
Ransomware has become an industry unto itself, crippling organizations around the world. Some attacks, such as the recent ones perpetrated against..
Insights
Ensuring Security and Compliance for Global Healthcare
Prestigious healthcare systems continue to be at risk for the next devastating ransomware attack or data breach. Defending against attacks while..
Insights
What happens when tens of thousands of back doors have been opened? Priceless data and corporate IP stolen, espionage, but by far the most prevalent..