BrickStorm is a highly stealthy Linux backdoor designed for long-term, targeted cyber-espionage. Brickstorm is closely associated with Cyber Espionage group UNC5221, which is known for exploiting zero-days vulnerability in network edge appliances like Ivanti, F5 and MiTRE breach. Unlike commodity malware, BrickStorm is deployed post-compromise, operates largely in memory, and uses a modular architecture with custom encrypted command-and-control (C2). Its focus on Linux servers, network appliances, and embedded systems reflects a broader trend: attackers increasingly target infrastructure layers where visibility and detection are weakest.
Security is a product decision, not an afterthought. As a further commitment to this principle and as a reflection of our pledge to the CISA Secure by Design goals, over the past year Versa has been putting them into practice across our platform, processes, and programs. Organized below around the seven Secure by Design pledge goals is a summary of the related new capabilities and enhancements we’ve delivered, along with a quick explanation of the importance of the changes.
At Versa, we take pride in knowing we’ve truly made a difference for our customers. We are deeply invested in products that solve real problems, not just features on a roadmap, but solutions that help real people do their best work. When customers take the time to share how Versa has helped them transform their organizations, it reminds us why we do what we do.
How Zero Trust Network Access (ZTNA) replaces VPNs to secure users, data, and applications across cloud, branch, and remote environments.
TransparentTribe (also known as APT36), a state sponsored threat actor known for long running cyber espionage against defense and government sectors, has launched a new campaign leveraging a custom Remote Access Trojan (RAT) dubbed DeskRAT. This malware is distributed through phishing emails containing malicious attachments or links that deliver the payload to targeted systems.
Learn how Unified SASE helps enterprises overcome cyber fragmentation, boost resilience, and unify Zero Trust security across hybrid environments.
Hybrid work, hybrid clouds, and distributed enterprise architectures have made one thing clear: security can no longer be built around a single perimeter. Today’s networks span branches, multi-cloud workloads, data centers, and thousands of IoT and remote endpoints. Yet many organizations still operate siloed firewall architectures that weren’t designed for this reality — leaving them with fragmented visibility and inconsistent policy control.
Versa’s Cloud Access Security Broker (CASB) effectively deals with today’s enterprise security challenge of accessing SaaS applications, as we’ll explore further in this blog.
Operational Technology (OT) is no longer an air-gapped island. Manufacturing and distribution sites now connect Programmable Logic Controllers (PLCs), Human-Machine Interfaces (HMIs), and sensors to cloud analytics and remote vendors, which expands both capability and the attack surface. In this context, Versa’s Next‑Gen Firewall (NGFW), delivered as part of its Universal SASE platform, provides OT‑aware visibility, segmentation, continuous inspection, and zero-trust controls to protect these devices.
Learn how Versa Networks helps financial institutions meet DORA compliance with secure, resilient networking and ICT risk management solutions.
Subscribe to the Versa Blog