Virsec Blog
Discover the latest in cybersecurity, current events, and wisdom from our industry experts.
Tick ... Tick ... Boom
What happens when tens of thousands of back doors have been opened? Priceless data and corporate IP stolen, espionage, but by far the most prevalen...
Hafnium & Exchange: Elements of the Attack
The ongoing attacks on Microsoft Exchange servers by the Hafnium cyber espionage group appear to be escalating, and potentially impacting a wider r...
Why the SolarWinds Attack Easily Slipped by All EDR/EPP Solutions
The SolarWinds attack was a brutal security failure that continues to impact the US government, agencies, and thousands of businesses. To the disma...
Security Vendors Understate Risks in Senate Hearing on SolarWinds
Satya Gupta, Founder and CTO, Virsec
The US Senate Cyber Intelligence Committee held a hearing on the SolarWinds attack on February 24, 2021. Sen...
The Real Culprit Behind SolarWinds: Remote Code Execution
In the ongoing aftermath of the devastating SolarWinds breaches, a lot of attention has focused on who did it (Russian hackers) and how they broke ...
Important Take-Aways from the SolarWinds Attack
Satya Gupta, Founder and CTO, Virsec
In our ongoing analysis of the SolarWinds attack and fallout, following are recommendations for best practices...
Analyzing the SolarWinds Kill Chain
Satya Gupta, Founder and CTO, Virsec
The recent attacks on government agencies and enterprises delivered through SolarWinds, used a complex series ...
Analysis of the SolarWinds Supply Chain Attack
Satya Gupta, Founder and CTO, Virsec
Note: Given the severity of the ongoing SolarWinds attack, Virsec will be providing a range of expert analysis...
Subscribe to Blog
Get timely insight about server workload protection, runtime visibility, and defend against attacks – known and unknown.
Newsletter
Categories
- Blog (237)
- Security News (126)
- SolarWinds (8)
- Cybersecurity (7)
- RCE Attack (3)
- Remote Code Execution (3)
- EPP/EDR (2)
- Microsoft (2)
- Ransomware (2)
- SolarWinds Attack (2)
- Zero Trust (2)
- Acer Ransomware Attack (1)
- Cloud Security (1)
- Container Protection (1)
- Cyber Attack (1)
- Cyber Resilience (1)
- Exchange (1)
- MS Exchange Attack (1)
- National Vulnerability Database (1)
- Patching (1)
- Virsec Security Research Lab (1)