Virsec
Virsec
  • 80
  • 29 766
Protect Business Continuity with a Diversified EDR Strategy
Zero-day attacks, ransomware, and highly vulnerable servers and endpoints are keeping CISOs up at night. Faced with multi-vector threats, a diversified strategy for endpoint detection and response is needed. In this webcast, you will hear the voice of experience:
David Reilly, former CIO and CTO of Bank of America, and Simone Sassoli, CEO of Virsec, as they discuss:
- Why threats to business disruption are greater than ever.
- The importance of maintaining cyber hygiene.
- Why conventional EDR approaches fall short.
- How to minimize risk for critical workloads.
- How to implement zero trust at runtime to achieve better business continuity and resilience.
มุมมอง: 117

วีดีโอ

Virsec's Autonomous Application Control Explainer Video
มุมมอง 942 หลายเดือนก่อน
Are you looking for a way to diversify your endpoint detection and response cybersecurity strategy? Keep your EDR on your endpoints and let Virsec's autonomous application control proactively protect your server workloads through its two products, TrustSight and TrustGuardian. Learn more in this short explainer video. Find out more at www.virsec.com #ExplainerVideo #productvideo #animationvideo...
Application Security Platform
มุมมอง 499 หลายเดือนก่อน
Application Security Platform: It takes mere seconds for an attack to execute and impact an application, by the time most tools detect and respond, the damage is done. Virsec’s application security platform is the only solution that stops threats at runtime and protects against dangerous attacks targeting business-critical applications and workloads.
How Remote Code Execution Works
มุมมอง 4849 หลายเดือนก่อน
How Remote Code Execution (RCE) Works Attackers use remote code execution to infiltrate a system and run their code instead of the system’s legitimate code, and they can do this regardless of geographical location. Once inside, the attackers can open backdoors, trigger code remotely, steal data, disrupt services, affect operations, and install crypto mining software. Leveraging remote code exec...
Runtime Defense for Legacy Workloads
มุมมอง 419 หลายเดือนก่อน
Runtime Defense for Modern & Legacy Workloads Modern workloads for most organizations typically comprise hundreds of systems executing across multiple clouds, on-premises, VMs, and containers. Protecting this dynamic and complex environment is increasingly more critical as advanced attacks target these crown jewels. Traditional EPP/EDR solutions designed for protecting end-user clients are not ...
Cybersecurity After EOS for Windows Server 2012
มุมมอง 529 หลายเดือนก่อน
Prevent Cyber Attacks After Microsoft Ends Support for Windows Server 2012 Microsoft has announced that they will discontinue support for Windows Server 2012 and 2012 R2 and as a result security updates will no longer be available, leaving System Administrators, CTOs, and CISO with limited options. One option always open to securing applications on legacy servers is to install the Virsec Securi...
Stop Ransomware
มุมมอง 449 หลายเดือนก่อน
Stop Ransomware - The Ransomware Challenge Stopping attacks at their root, when malicious code executes on workloads, can be the difference between non-event and long-term damage. The Virsec Security Platform (VSP) counters ransomware attacks to prevent damage, and propagation, to defuse evasive tactics targeting specific workloads and valuable data.
CVE-2023-46604 Apache ActiveMQ Vulnerability | Analysis by Virsec
มุมมอง 1.4Kปีที่แล้ว
Watch this cyberattack demonstration showing how the Virsec Security Platform (VSP) blocks the remote code execution vulnerability, CVE-2023-46604, identified in Apache ActiveMQ software. The vulnerability allows a remote attacker to run arbitrary shell commands, leading to data exfiltration, credential theft, ransomware, denial of service, crypto mining, and botnet activities. Rapid7's MDR Res...
CVE-2022-2441 WordPress ImageMagick Plugin Vulnerability | Analysis by Virsec
มุมมอง 173ปีที่แล้ว
The National Vulnerability Database (NVD) disclosed an RCE vulnerability, CVE-2022-2441 (High Impact), in the WordPress ImageMagick Engine plugin. The vulnerability requires tricking the admin and can lead to remote code execution, data exfiltration, credential theft, ransomware, denial of service, crypto mining, and botnet activities. Threat actors leverage tools to find enterprises that host ...
Cyber Security for Legacy Workloads
มุมมอง 35ปีที่แล้ว
Cyber Security for Legacy Workloads :: Legacy Workloads Do Not Need to Pose a Risk Embracing digital transformation while retaining legacy systems doesn’t have to come at a cost or pose a significant risk to an organization. Virsec extends a zero trust approach to protecting legacy and unsupported workloads as effectively as modern platforms - economically and for good. Virsec’s Cyber security ...
Cybersecurity for Legacy Applications
มุมมอง 71ปีที่แล้ว
Secure Legacy Applications and Workloads Instantly True zero trust workload protection capabilities continuously address known and unknown vulnerabilities in Windows and Linux-based software, even those that are no longer supported and left unpatched. Now, IT is no longer left to find individuals with enough expertise to develop custom fixes to address troublesome vulnerabilities in technologie...
What Is a Cyber Security Platform?
มุมมอง 89ปีที่แล้ว
Our Cyber Security Platform is designed to only allow the applications that you trust to run and stops everything else, preventing critical data, applications, and runtime unpatched vulnerabilities from being exploited by malware, ransomware, or data breaches. Virsec’s Cyber Security Platform is essentially an EDR on your servers with Zero Trust Runtime Defense. Eliminate Zero-Day Threats and A...
Cyber Security Platform
มุมมอง 43ปีที่แล้ว
Welcome to the Virsec Cybersecurity Platform Reduce Risk Eliminate open attack surfaces, like unpatched vulnerabilities, to reduce the impact of zero-day cyber threats to applications and workloads and save costs from the impact of a breach. Tools & Services Consolidation Consolidate server-based security tools to reduce configuration, licensing, and alert fatigue. Avoid costly extended securit...
CVE 2023 4911 Looney Tunables Vulnerability | Analysis by Virsec
มุมมอง 320ปีที่แล้ว
CVE 2023 4911 Breach. Hack RCE Exploit - Expert Analysis: Watch how the Virsec Security Platform (VSP) acts as a compensating control to protect a vulnerable Ubuntu server against a local privilege escalation vulnerability in GLIBC library of Linux. This cyber security exploit is commonly referred to as 'Looney Tunables' due to its association with the famous Porky Pig's dialogue, 'That's all f...
Zero Trust Runtime Defense for Malware, Ransomware, Data Breach Prevention
มุมมอง 177ปีที่แล้ว
Stop Tomorrow's Zero-Day Attacks, Today with Zero Trust Runtime Defense: The shift from phishing to zero-day and one-day vulnerability exploits has many CISOs feeling pressured to rethink their security posture and refresh their defense-in-depth investments. The current external focus on threat intelligence leaves one clear gap in the armor of endpoint detect and respond postures - the applicat...
Cyber Security Platform Protects: WP Vulnerabilities Import XML & RSS Feeds Plugin
มุมมอง 196ปีที่แล้ว
Cyber Security Platform Protects: WP Vulnerabilities Import XML & RSS Feeds Plugin
CVE-2023-33246 Apache RocketMQ Vulnerability | Analysis by Virsec
มุมมอง 470ปีที่แล้ว
CVE-2023-33246 Apache RocketMQ Vulnerability | Analysis by Virsec
Virsec's Automated Allowlisting Using Packages and Publishers
มุมมอง 150ปีที่แล้ว
Virsec's Automated Allowlisting Using Packages and Publishers
Virsec's Allowlisting Using Maintenance Mode
มุมมอง 86ปีที่แล้ว
Virsec's Allowlisting Using Maintenance Mode
Virsec's Guided Probe Deployment
มุมมอง 70ปีที่แล้ว
Virsec's Guided Probe Deployment
Virsec's Application Auto-Discovery
มุมมอง 91ปีที่แล้ว
Virsec's Application Auto-Discovery
Reducing Panic Patching by Applying Zero Trust Protection to Workloads
มุมมอง 369ปีที่แล้ว
Reducing Panic Patching by Applying Zero Trust Protection to Workloads
Virsec Automated Protection Platform
มุมมอง 2032 ปีที่แล้ว
Virsec Automated Protection Platform
Virsec Protects: Follina Exploit
มุมมอง 1602 ปีที่แล้ว
Virsec Protects: Follina Exploit
Virsec Protects: Atlassian Confluence Exploit
มุมมอง 1242 ปีที่แล้ว
Virsec Protects: Atlassian Confluence Exploit
Virsec Overview
มุมมอง 1.1K2 ปีที่แล้ว
Virsec Overview
Virsec Protects: Spring4Shell
มุมมอง 1542 ปีที่แล้ว
Virsec Protects: Spring4Shell
Virsec Protects: PrintNightmare Vulnerability
มุมมอง 1292 ปีที่แล้ว
Virsec Protects: PrintNightmare Vulnerability
Virsec Protects: Log4j Vulnerability
มุมมอง 2252 ปีที่แล้ว
Virsec Protects: Log4j Vulnerability
Gulf Healthcare Testimonial
มุมมอง 912 ปีที่แล้ว
Gulf Healthcare Testimonial

ความคิดเห็น

  • @thiernomamadoumouctarmara6374
    @thiernomamadoumouctarmara6374 22 วันที่ผ่านมา

    Hi, can I have the diagram of this attack?

    • @virsecworkloadprotection
      @virsecworkloadprotection 15 วันที่ผ่านมา

      Please email marketing@virsec.com and I'll send it via email!

  • @InacioSilvajmd
    @InacioSilvajmd 6 หลายเดือนก่อน

    Sir link tool

  • @ВиталийОвчаренко-и1н
    @ВиталийОвчаренко-и1н 8 หลายเดือนก่อน

    The stages involved in addressing problems related to CVE-2023-46604 are as follows: 1. **Identification**: Recognize the vulnerability in Apache ActiveMQ, specifically the Remote Code Execution (RCE) flaw. 2. **Assessment**: Understand the impact of the vulnerability, which allows attackers to execute arbitrary shell commands by manipulating serialized class types in the OpenWire protocol. 3. **Patch Application**: Apply the security patch provided by Apache in the latest versions of ActiveMQ to mitigate the vulnerability. 4. **Monitoring**: Keep track of software vendor advisories for security updates related to CVE-2023-46604 and promptly apply any necessary patches to fortify systems against potential exploitation. 5. **Proactive Measures**: Stay proactive in addressing the vulnerability by fortifying systems, applying patches promptly, and ensuring the security of applications reliant on Apache ActiveMQ.

  • @diakhoalmamy9526
    @diakhoalmamy9526 9 หลายเดือนก่อน

    Hello thanks can you send me the of the PoC

  • @d0-2
    @d0-2 9 หลายเดือนก่อน

    😶‍🌫

  • @jawirtersakiti
    @jawirtersakiti ปีที่แล้ว

    can you put link exploit

  • @tiphanysou8320
    @tiphanysou8320 ปีที่แล้ว

    *Promo sm*

  • @juliannelorenescarsa9213
    @juliannelorenescarsa9213 ปีที่แล้ว

    great info, thanks

  • @rogerm1205
    @rogerm1205 ปีที่แล้ว

    Promo>SM 👀

  • @mikasecurities-inspiretoin8737
    @mikasecurities-inspiretoin8737 2 ปีที่แล้ว

    Mika Securities is proud to implement Virsec product in our business

    • @virsecworkloadprotection
      @virsecworkloadprotection 2 ปีที่แล้ว

      Thank you for your business and trusting Virsec with your security needs.

  • @mikasecurities-inspiretoin8737
    @mikasecurities-inspiretoin8737 2 ปีที่แล้ว

    Mika Securities is proud to implement Virsec product in our business

  • @buckfush187
    @buckfush187 2 ปีที่แล้ว

    Rust, I think is being touted as the “safer” version of c/c++. Go is like the easier to use version of c/c++

  • @oedihamijok6504
    @oedihamijok6504 2 ปีที่แล้ว

    You guys need more POC videos like SentinelOne... nice deterministic job!

  • @vuvvz
    @vuvvz 2 ปีที่แล้ว

    love it!

  • @tubeles5920
    @tubeles5920 3 ปีที่แล้ว

    Excellent. I'm happy to be part of bringing this one-of-a-kind, first-of-its-kind approach and technology in cybersecurity, here in the Philippines. This makes A.I., machine learning, behavioral analysis, whitelisting/blacklisting, sandboxing, EDR, all of which, are JURASSIC.

  • @amari3460
    @amari3460 3 ปีที่แล้ว

    Nice! You should have way more views! You should go and take a look at PromoSM!!! It is the best way to promote your videos!

  • @keyboarddancers7751
    @keyboarddancers7751 3 ปีที่แล้ว

    Who's here after the Colonial Pipeline hack?

  • @Pauloveskim
    @Pauloveskim 3 ปีที่แล้ว

    These Chinese are smarter than they look. 30,000 companies is a lot.

  • @marcozaliani8635
    @marcozaliani8635 3 ปีที่แล้ว

    Do you guys have any sources about how the initial infiltration happened?

  • @rajnigupta3648
    @rajnigupta3648 3 ปีที่แล้ว

    Very Informative. Please keep posting videos with latest videos

  • @taleliyahu3236
    @taleliyahu3236 3 ปีที่แล้ว

    Where I can find the presentation?

  • @tacticalgaryvrgamer8913
    @tacticalgaryvrgamer8913 3 ปีที่แล้ว

    Fantastic subject and content

  • @tacticalgaryvrgamer8913
    @tacticalgaryvrgamer8913 4 ปีที่แล้ว

    Great conversation....stay tactical! Cyber tactical that is!

  • @bongobreathman
    @bongobreathman 4 ปีที่แล้ว

    Excellent!!

  • @IsSheRG710
    @IsSheRG710 5 ปีที่แล้ว

    FYI the actual presentation starts here: th-cam.com/video/_Vifk0zevuI/w-d-xo.html