Inside Out Security
SolarWinds SUNBURST Backdoor: Inside the Stealthy APT Campaign
Imagine if everyone with an Amazon Echo in their home had to assume it’s been unlocking their doors and letting a thief inside for the past 6 months. How would you...
Read MoreExplore by topic:
Threat Update 28 – Re-Ryuk’ed & Exchange Zero-Day
Is it too soon for a 2020 throwback? The Ryuk ransomware gang certainly doesn’t think so! It looks like one of the premiere ransomware-as-a-service groups was not content to rest...
Threat Update – Mass Exploitation of On-Prem Exchange Servers
On March 2nd, Microsoft released an urgent software update to patch 4 critical vulnerabilities in Exchange Server 2010, 2013, 2016, and 2019. Our IR and Forensics teams are actively helping organizations patch,...
Last Week in Microsoft Teams: Week of March 1st
This week Microsoft is hosting the Spring Microsoft Ignite 2021 conference. The Microsoft Teams blog provided a guide for everything Microsoft Teams at this free virtual event. Microsoft announced the...
Attack lab: Spear Phishing with Google Drive Sharing
Phishing scams are as old as the internet—tricking victims into divulging important information about themselves and their accounts. These scams are so common that all of the major email providers...
Threat Update 27 – Concentrations of Power
Why are there certain account types that are often targeted by attackers? Why can it be really difficult to detect certain types of account misuse? What are some of the...
Varonis Veterans Spotlight: Georgi Georgiev
Welcome to the Varonis Veteran Spotlight! The purpose of this spotlight is to show our gratitude and appreciation for our Varonis Veterans, as well as honor their military service and...
Last Week in Microsoft Teams: Week of February 22nd
Corporate Vice President Jeff Teper posts about the vision behind the Viva announcement. Microsoft designed Viva to keep remote employees engaged and ensure they prioritize learning and career growth. The...
ReConnect – Version 8.5 and Combating Insider Risks in Microsoft 365
How do you visualize, measure, and reduce internal data exposure in Microsoft 365? What about detecting advanced threats like the SolarWinds attack? Kilian and Brian walk through the TL;DR version...
Your Primer to Third-Party Risk Management
Third-party risk management is an essential part of a company’s cybersecurity strategy but one that doesn’t often get the attention (or resources) it needs. But if it’s ignored, enterprises are...
Threat Update 26 – Living with Supply Chain Attacks
For years, security professionals have warned that you have to assume you’re breached, but the Solarwinds supply chain attack really brought this into focus for many organizations. Unfortunately, this is...