<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1462084720533760&amp;ev=PageView&amp;noscript=1">
Skip to content

Virsec Blog

Stay up-to-date on all things Virsec. Read the latest news, press releases and other updates about our work.

Virsec-Blog-Header Image@2x
Protecting against the Follina CVE Exploit

Cyber Security

Protecting against the Follina CVE Exploit

The Follina remote code execution (RCE) vulnerability in the Microsoft Support Diagnostic Tool (MSDT) was first widely publicized on May 27, 2022....

Read More
Filter By

All Tags

Reset
img

Insights

Gartner Market Guide Calls Memory Protection a “Mandatory Capability”

Cloud Workload Protection Platform Report Highlights Changing Security Needs

Research firm Gartner recently released an update to its Market Guide..

img

Insights

LockerGoga Ransomware Slams Industrial Firms in Europe, Could Hit Anyone

LockerGoga combines ransom demand “negotations”, aggressive disruption and total lock out

Over the last few months, a new ransomware, LockerGoga, has..

img

Insights

Prediction Series #10: Reports of China chip hacking should be a warning to US supply chain

Last Fall reports came out claiming that rice-grain sized spying devices were secretly being planted onto US servers during the manufacturing..

img

Insights

Prediction Series #9: Hackers continue spending weeks & months of dwell time in networks

As NVD vulnerabilities and cyber breaches rise, so does hacker dwell time.

The number of known vulnerabilities year over year is exploding. The..

img

Insights

Prediction Series #8: GDPR Breach Disclosure Mandate Is Now Global & Must Be Timely

Companies will be forced to be upfront and timely or face even steeper fines

Coming up on the first anniversary, many companies still working on..

img

Insights

Five Tech Giants – Facebook, Twitter, Apple, LinkedIn, Google – Face Investigations for Possibly Violating European Privacy Laws

The GDPR poses big potential problems for Facebook, Apple, Twitter and LinkedIn if they’ve violated stricter privacy laws

The GDPR’s big teeth are..

img

Insights

Prediction Series #7: If organizations are to increase their focus on application security, they must move beyond RASPs

Gaining truly self-defending application protection requires more than RASPs

RASPs over promise and under deliver

The concept of making applications..

img

Insights

MY TAKE: Memory hacking arises as a go-to tactic to carry out deep, persistent incursions

The Last Watchdog, by Byron V. Acohido, March 4, 2019; with comments by Satya Gupta

In his article last week, Byron Acohido discusses how memory..

img

Insights

Prediction Series #6: Alert fatigue undermines security, exhausts SOC teams

Security teams sometimes dial down WAFs, which achieves fewer false positives but compromises security

Indulging false positives sacrifices security

img

Insights

Why Companies Need an Application Memory Firewall

An application memory firewall detects what other security solutions miss and protects applications and memory from cyber attack

Looking But Not..

Extend SECTION SETTINGS - THIS ELEMENT WILL BE SHOWN ONLY IN THE CONTENT EDITOR