Virsec Blog
Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.


Zero Day Exploit
Extend Zero-Trust to Legacy Applications and Workloads
Large Attack Vector - Unpatched Application Workloads
Read MoreAll Tags
- Blog (238)
- Security News (126)
- Research Lab (26)
- Cybersecurity (24)
- Cyber Attack (22)
- application aware workload protection (17)
- application aware protection (15)
- runtime protection (14)
- Cyber Security (12)
- Ransomware (10)
- Remote Code Execution (9)
- SolarWinds (8)
- Cloud Security (7)
- Cyber Resilience (6)
- Deterministic Protection (6)
- Vulnerability (6)
- Apache (5)
- DPP (5)
- Deterministic Protection Platform (5)
- ICS/SCADA (4)
- Microsoft (4)
- CEO (3)
- Protect Application Workloads (3)
- Public Sector (3)
- RCE Attack (3)
- Zero Trust (3)
- Zero-Day Exploit (3)
- industrial control system (3)
- software (3)
- EPP/EDR (2)
- Kaseya supply chain ransomware attack (2)
- Microsoft Windows (2)
- National Vulnerability Database (2)
- Patching (2)
- PrintNightmare vulnerability (2)
- SolarWinds Attack (2)
- hack (2)
- legacy applications (2)
- security best practices (2)
- Acer Ransomware Attack (1)
- Buffer Overflow (1)
- CIO (1)
- CISA (1)
- CVE (1)
- Carahsoft (1)
- Code Injection (1)
- Container Protection (1)
- Endpoint Security (1)
- Exchange (1)
- Gartner (1)
- Government (1)
- Hafnium (1)
- IBM (1)
- MS Exchange Attack (1)
- Malicious Attacks (1)
- Malware (1)
- Memory Protection (1)
- PCI Compliance (1)
- Partnerships (1)
- Printers (1)
- ProxyNotShell (1)
- REvil ransomware (1)
- SEC (1)
- SSRF (1)
- Spring4Shell (1)
- Supply Chain Disruption (1)
- Threat Intelligence (1)
- Virsec Security Platform (1)
- Virsec Security Research Lab (1)
- Vulnerability Analysis (1)
- Water Utility Attack (1)
- WordPress (1)
- billington cybersecurity summit (1)
- compliance (1)
- information security (1)
- log4j (1)
- regulatory (1)
- software vulnerabilities (1)
- state government (1)
- stealth memory-based attacks (1)
Insights
Remote Code Execution Explained
Nation-state actors are making a killing leveraging advanced attack techniques like remote code execution (RCE). If the attack on the SolarWinds..
Insights
What happens when tens of thousands of back doors have been opened? Priceless data and corporate IP stolen, espionage, but by far the most prevalent..
Insights
Hafnium & Exchange: Elements of the Attack
The ongoing attacks on Microsoft Exchange servers by the Hafnium cyber espionage group appear to be escalating, and potentially impacting a wider..
Insights
The Real Culprit Behind SolarWinds: Remote Code Execution
In the ongoing aftermath of the devastating SolarWinds breaches, a lot of attention has focused on who did it (Russian hackers) and how they broke in..
Insights
CVE-2020-17051 Wormable RCE in Windows NFS server
Virsec Security Research Lab Vulnerability Analysis
The Virsec Security Research Lab provides detailed analysis on recent and notable security..
Insights
CVE-2020-13957 Apache Solr RCE
Virsec Security Research Lab Vulnerability Analysis
The Virsec Security Research Lab provides detailed analysis on recent and notable security..
Insights
CVE-2020-9484 Apache Tomcat RCE
Virsec Security Research Lab Vulnerability Analysis
The Virsec Security Research Lab provides detailed analysis on recent and notable security..
Insights
CVE-2020-13166 MyLittleAdmin PreAuth RCE
Virsec Security Research Lab Vulnerability Analysis
The Virsec Security Research Lab provides detailed analysis on recent and notable security..