Virsec Blog
Get application security & cyber attacks (memory-based, ROP Chain) insight regularly here. Also learn about Web App Protection & Memory Attack Protection.

The Need to Simplify Compliance Risk Control Implementation
Virsec Team | | application aware workload protection, Compliance, Cyber Security, Cyber-attack, Ransomware, Regulatory, runtime protection, SEC, state government, vulnerability
Organizations around the world must fulfill an increasing number of regulatory requirements including NIST, Sarbanes-Oxley Act (SOX), Health Insurance Portability and Accountability Act (HIPAA), Payment Card Industry Data Security Standard (PCI-DSS) and ...

The White House Cybersecurity Summit: A Step Forward in the Right Direction
Kevin Jones | | application aware workload protection, Cyber Security, Cyber-attack, government, Information Security, Ransomware, software, Threat Intelligence, vulnerability
Today the White House hosted a cybersecurity summit to address the rolling headline-making cyberattacks. According to news reports, the federal government and several major technology companies announced numerous important initiatives including better ...

Defining What it Means to Secure Software in Runtime
Virsec Team | | application aware protection, application aware workload protection, Cyber Security, Cyber-attack, Kaseya supply chain ransomware attack, Ransomware, runtime protection, vulnerability
The most critical and challenging weakness in cybersecurity is the inability to protect applications, or software, at runtime. Runtime is a vulnerable blind spot deep within the application infrastructure. Today’s cybersecurity tools ...

Blocking the Exploitation of PrintNightmare
Virsec Team | | application aware protection, application aware workload protection, Cyber Security, Cyber-attack, Microsoft Windows, printers, PrintNightmare vulnerability, runtime protection, vulnerability
Last week, in its Patch Tuesday update, Microsoft Security Response Center released an additional security fix for the series of zero-day vulnerabilities known collectively as “PrintNightmare,” which can be used to break ...

Make Cyberattacks Like Hafnium Irrelevant
Virsec | | application aware protection, application aware workload protection, Cyber Security, Cyber-attack, Hafnium, runtime protection
Recent statements issued by the United States, European Union, and the United Kingdom have accused China of conducting the cyberattack against Microsoft’s Exchange Servers. China continues to deny the claims, but officials ...

Critical Capabilities for Cloud Workload Protection Platforms
The Gartner Market Guide for Cloud Workload Protection Platforms addresses what industry professionals should look for in a cloud workload protection platform. After reviewing the guide and evaluating, two things remain clear—protection ...

Essential Protection for Legacy Applications – Part 1
Virsec | | application aware protection, application aware workload protection, Cyber Security, Cyber-attack, legacy applications, runtime protection
Legacy applications are essential components of almost every organization yet are fraught with vulnerabilities and security challenges. Effective protection of legacy applications is a rich and complex topic that we will detail ...

CTO Perspective: Examination of the REvil Ransomware Attack
Virsec | | application aware protection, application aware workload protection, Cyber Security, Cyber-attack, Hack, Kaseya supply chain ransomware attack, Ransomware, REvil ransomware, runtime protection
By Satya Gupta, Founder and CTO, Virsec Over the July 4th weekend, the REvil ransomware syndicate hit software supplier Kaseya Ltd. and crippled more than 200 United States companies. The criminals took ...

Anyone Can Be Hacked
Virsec | | application aware protection, application aware workload protection, Cyber Security, Cyber-attack, Hack, Ransomware, runtime protection
The truth is no organization is un-hackable. As John Chambers, former CEO of Cisco, and current CEO and founder of JC2 Ventures, stated several years ago, “There are two types of companies: those ...

Ransomware: A Thriving Business
Virsec | | application aware protection, application aware workload protection, Cyber Security, Cyber-attack, Ransomware, runtime protection
Ransomware has become an industry unto itself, crippling organizations around the world. Some attacks, such as the recent ones perpetrated against the Colonial Pipeline, JBS, and Acer, are discovered quickly. Others can ...