In the News2018-08-28T22:23:08+00:00


Critical infrastructure will have to operate if there’s malware on it or not

By |September 20th, 2018|Categories: Virsec in the News|

Expert commentary given from Major General Robert Wheeler, retired US Air Force, and former Deputy Chief Information Officer for Command, Control, Communications and Computers (C4) and Information Infrastructure Capabilities (DCIO for C4IIC), US Air Force, expressed this viewpoint in a webinar organized this past week by California-based cyber-security firm Virsec. Critical infrastructures have weak points that make them susceptible to threat [...]

Virsec and Aveva Talk Security at Aveva World Conference 2018

By |September 13th, 2018|Categories: Virsec in the News|

Willy Leichter, Virsec, leads 3-minute talk with Rashesh Mody and Satya Gupta about tackling security challenges facing the ICS industry. Watch the interview Willy: We’re here at the Aveva World Conference in Dallas, Texas and we’re speaking with Rashesh Mody (Aveva) and Satya Gupta. We want to briefly talk about some of the security challenges that seem to be facing [...]

In Today’s Environment of Everyday CyberThreats, How Can We Out Smart the Attackers?

By |September 8th, 2018|Categories: Video Blog, Virsec in the News|

Listen to interview from Black Hat 2018 Most every day we can read about another business falling prey to a sophisticated cyberattack and its customers suffering through another compromise of their data. Most businesses think it won’t happen to them – until it does. Not all companies are targets, but not all malware specifies a target. ICS/SCADA facilities is especially [...]

SecurityGuyTV/ASIS-TV interviews Willy Leichter at Black Hat 2018

By |August 20th, 2018|Categories: Security News, Virsec in the News|

Listen to full ASISTV interview with Virsec Black Hat 2018: Chuck Harold with SecurityGuyTV/ASIS-TV interviews Willy Leichter with Virsec. Discussion topics include the latest trends in today’s attack landscape, such as: The disappearing perimeter and lack of effective perimeter security Stealthy fileless application attacks Attacks that weaponize in memory at runtime Vulnerabilities at the chip level Listen to full ASISTV [...]

Tech Companies Cool Toward California Consumer Privacy Act

By |July 31st, 2018|Categories: Virsec in the News|

Security Boulevard, July 24, 2018, with comments by Willy Leichter A tough new privacy law has passed in California, taking effect January 1, 2020. It’s the new California Consumer Privacy Act and it will give consumers more control over their personal information, including that they will be able to request details on how their personally identifiable information (PII) is collected [...]

DHS gives more details, including unclassified info, about electrical grid attacks by Russian agents

By |July 27th, 2018|Categories: Virsec in the News|

Brilliance Security Magazine & Search Security, June 26, 2018, with comments by Ray DeMeo; This week’s announcement of attacks marks yet another round of break-ins into US utilities and electrical grids by Russian hackers. Viewed with increasing alarm, the Department of Homeland Security is offering utility providers an awareness briefing on Russian activity against critical infrastructure.  More information and dates [...]

Application attacks demand new security approach

By |July 26th, 2018|Categories: Security News, Virsec in the News|

Computer Weekly and Journal of Cyber Policy, July 24, 2018, with comments by Satya Gupta; Applying security software updates is an ineffective way to deal with application layer cyber attacks and businesses should change their approach, security experts advise. Despite security updates being available, two groups have begun large-scale attacks on an Oracle WebLogic Server remote code execution vulnerability, following [...]

Russian Hackers Breach US Utility Networks via Trusted Vendors

By |July 25th, 2018|Categories: Security News, Virsec in the News|

WSJ, GreenTech Media, IS Buzz, Journal of Cyber Policy, ECT News and the WSJ, July 24-25, 2018, with comments by Ray DeMeo; Hackers accessed confidential information, including equipment in use and how utility networks are configured. If this sounds familiar, it’s because it is. Russian hackers broke into the U.S. electric grid last year in a similar way, though the [...]

Spectre Will Haunt Us for a Long Time | Guest Article

By |July 24th, 2018|Categories: Virsec in the News|

Threatpost, 7/23/18, guest article at Threatpost by Willy Leichter; Just as the issues underpinning Spectre started a long time ago – going back to the first Intel Pentium processors developed in 1995 – the problem we now face as a result will stretch forward for a long time as well. Users have blissfully been benefitting from a performance gain in [...]