Varonis Debuts Trailblazing Features for Securing Salesforce

Learn More

✕
Skip navigation
  • Platform
    • Products
    • Overview
    • Data Protection
      • > DatAdvantageData audit & protection
      • > Automation EngineData remediation
      • > DataPrivilegeData access governance
      • > Data Transport EngineAutomated policy enforcement
    • Threat Detection & Response
      • > DatAlertData-centric UBA
      • > EdgePerimeter detections for DatAlert
      • > Varonis for Active DirectoryAnomaly detection & hardening
    • Privacy & Compliance
      • > Data Classification EngineSensitive data discovery
      • > Policy PackGDPR & CCPA discovery policies
      • > Federal Policy PackTop secret & CUI discovery policies
      • > Data Classification LabelsSensitive data labeling
      • > DatAnswersDSARs, e-Discovery, PII search
    • Cloud Security
      • > DatAdvantage CloudSaaS & IaaS Security
      • > Data Classification CloudSensitive data discovery
      • > Varonis for Microsoft 365Data-centric security for M365
      • > Varonis for SalesforceData-centric security for Salesforce
    • See all products
    •  
    • Learn more
    • How It Works
    • Integrations
    • Third-party Apps
    • Pricing
  • Solutions
    • By Industry
      • Finance
      • Healthcare
      • Federal Government
      • Education
      • Manufacturing
      • State & Local Government
    • By Use Case
      • Cloud Data Protection
      • Data Classification
      • Data Loss Prevention
      • Data Privacy & DSARs
      • Insider Risk Management
      • Ransomware Prevention
      • Zero Trust
    • By Technology
      • > Microsoft 365
      • > Windows File Shares
      • > Active Directory
      • > Google Drive
      • > Salesforce
      • > Nasuni
      • > UNIX/Linux
      • > Box
      • > Slack
      • > Okta
      • > GitHub
      • > NetApp
      See all integrations
  • Why Varonis?
    • Case Studies
    • Operational Plan
    • Industry Recognition
    • Customer Success
    • IR & Forensics Team
    • Measurable ROI
  • Company
    • About Varonis
    • Careers
    • Investor Relations
    • Press
    • Corporate Responsibility
    • Trust & Security
    • Brand
    • Contact Us
  • Partners
    • Partner Program
    • Partner Locator
    • Partner Portal
    • Service Providers
    • Technology Partners
  • Resources
    • Support
    • Resource Library
    • Blog
    • Free Security Courses
    • Product Training
    • SecurityFWD
    • Webinars
    • Events
  • Contact Us
    • Get support
    • +1 (877) 292-8767
  • Contact us
    • Get a demo
    • Get support
    • +1 (877) 292-8767

Inside Out Security

  • English
  • French
  • German
  • Portuguese - Brazil
  • Russian
Featured | Threat Research |

Clock for time it takes to read article 6 min read

Spoofing SaaS Vanity URLs for Social Engineering Attacks

Many SaaS applications offer what’s known as vanity URLs — customizable web addresses for landing pages, file-sharing links, etc. Vanity URLs allow you to create a personalized...
Tal Peleg
By Tal Peleg

Latest posts

Data Security |

May 20, 2022

98 Must-Know Data Breach Statistics [2022]
Rob Sobers
By Rob Sobers
Data Security |

May 19, 2022

SecurityRWD – Getting Started With Salesforce Entitlements
Kilian Englert
By Kilian Englert
Ransomware |

May 16, 2022

Why Every Cybersecurity Leader Should ‘Assume Breach’
Yaki Faitelson
By Yaki Faitelson
Featured | Threat Research |

May 11, 2022

Spoofing SaaS Vanity URLs for Social Engineering Attacks
Tal Peleg
By Tal Peleg
Ransomware |

May 6, 2022

Bad Rabbit Ransomware
Michael Buckbee
By Michael Buckbee

April 26, 2022

Varonis Debuts Trailblazing Features for Securing Salesforce
Avia Navickas
By Avia Navickas
Data Security |

April 25, 2022

SecurityRWD - Salesforce as a file server? You bet.
Kilian Englert
By Kilian Englert
Threat Research |

April 19, 2022

Hive Ransomware Analysis
Nadav Ovadia
By Nadav Ovadia
Data Security |

April 12, 2022

SecurityRWD - Introduction to AWS Lambda
Kilian Englert
By Kilian Englert
Data Security |

April 12, 2022

How to Use Volatility for Memory Forensics and Analysis
Neil Fox
By Neil Fox
Prev 1 2 3 4 5 Next
  • English
  • Deutsch
  • Français
  • Português - Brasil
  • Русский
  • Legal
  • |
  • Trust
  • Legal
  • |
  • Trust
© 2022
Varonis