Trump Administration Debating Encryption Crackdown

The encryption battle between government agencies, law enforcement and high tech companies continues To Encrypt or Not to Encrypt, That Is the Struggle Reporting from last week’s National Security Council meeting in Washington DC shows us the encryption argument continues. White house officials debated whether to pursue legislative action from ... Read More

Dark Web Becomes a Haven for Targeted Hits – Buyers and Sellers Conspire to Carry Out Malicious Crimes

Dark Reading, June 10, 2019 with comments by Ray DeMeo; Malware on the Dark Web is increasingly customized to target specific organizations and executives. The Dark Web is a demented shopping center where people can buy or sell any number of wicked and malicious products and services. Whatever an ill-minded ... Read More
Virsec Overview: Protecting Against Advanced Cyberattacks

Microsoft ‘Bluekeep’ Flaw Threatens Medical Devices, IoT

Security Ledger, May 28, 2019, with comments by Satya Gupta; Microsoft’s worm-friendly Bluekeep flaw affects medical devices and other Internet of Things endpoints, security experts are warning. ‘Bluekeep’ is a zero-day vulnerability that can strike Windows Remote Desktops and threatens medical devices and other endpoints that are connected to the ... Read More
Virsec Overview: Protecting Against Advanced Cyberattacks

ZombieLoad Affects Data Centers and Here’s What You Can Do About It

Data Center Knowledge, May 15, 2019, with comments by Satya Gupta; Experts say exploits would be sophisticated and take a long time to build, but operators should act now. Yesterday more news of another Intel chip vulnerability was revealed where attackers can grab sensitive data while processes are running. Nearly ... Read More
Chinese Hacking Group, Buckeye, Used Stolen NSA Hacking Tools Ahead of Shadow Brokers’ Leaks

Chinese Hacking Group, Buckeye, Used Stolen NSA Hacking Tools Ahead of Shadow Brokers’ Leaks

NSA Hacking tools Stolen in 2016 Were Leaked into the Wild in 2016 and 2017 In August of 2016, the mysterious group called The Shadow Brokers released its first round of stolen NSA hacking tools into the wild. They reportedly stole these prized hacking tools from the Equation Group, the ... Read More
Prediction Series #13 Final: For Defending Against 2019 Application Security Threats, Virsec Has You Covered

Prediction Series #13 Final: For Defending Against 2019 Application Security Threats, Virsec Has You Covered

| | Blog, Security News
In our Prediction blog series for 2019, we’ve outlined in 12 blogs 12 troubling areas where we expect cyber threats to expand this year. The Troubling Twelve 1. Security systems are blind to memory-based threats - a failure that will continue to pose data theft risks 2. Critical infrastructure organizations ... Read More
Prediction Series #11: Servers and endpoints differ vastly from each other & cannot be protected by the same means

Prediction Series #11: Servers and endpoints differ vastly from each other & cannot be protected by the same means

| | Blog, Security News
Priorities for servers, apps, and cloud workloads are shifting Nothing has changed the business and technology world more than the cloud. The cloud has changed the application delivery landscape, and the area that may be most effected of all is the area of security strategies. As businesses move their applications ... Read More

LockerGoga Ransomware Slams Industrial Firms in Europe, Could Hit Anyone

| | Blog, Security News
LockerGoga combines ransom demand “negotations”, aggressive disruption and total lock out Over the last few months, a new ransomware, LockerGoga, has been hitting industrial and manufacturing firms and causing devastating impact. Later strains of it have been even more damaging than the initial rounds. In some cases, it’s evident the ... Read More

Prediction Series #10: Reports of China chip hacking should be a warning to US supply chain

| | Blog, Security News
Last Fall reports came out claiming that rice-grain sized spying devices were secretly being planted onto US servers during the manufacturing process. The article created an uproar. Apple and Amazon, 2 of 30 companies said to be affected, adamantly denied the claims that malicious spy chips had been planted on ... Read More

Prediction Series #9: Hackers continue spending weeks & months of dwell time in networks

| | Blog, Security News
As NVD vulnerabilities and cyber breaches rise, so does hacker dwell time The number of known vulnerabilities year over year is exploding. The National Vulnerability Database (NVD) approached 20,000 vulnerabilities for 2018, an increase of over a 40% over 2017. This explosion reflects the increased complexity of the software stack ... Read More