Inside Out Security
Threat Update – Mass Exploitation of On-Prem Exchange Servers
On March 2nd, Microsoft released an urgent software update to patch 4 critical vulnerabilities in Exchange Server 2010, 2013, 2016, and 2019. Our IR and Forensics teams are actively helping organizations patch,...
Read MoreExplore by topic:
Last Week in Microsoft Azure: Week of April 12th
Senior Program Manager Gaurav Chandwani announces general availability of Cloud Services, which is a new Azure Resource Manager (ARM)-based deployment model for Azure Cloud Services. Microsoft released a Static Web...
Threat Update 33 – S3 Security Suggestions & Cyber Insurance Targets
Question: What does S3 security, and cyber insurance have in common? Answer: We discuss them in the video today! That was a bit of a trick question, but two very...
How Varonis Limits Organization-Wide Exposure
If you were hired at a top financial institution as a junior analyst tomorrow, chances are you’d have access to 20% of the company’s data on day one. Data available...
Last Week in Microsoft Azure: Week of April 5th
On April 1, Microsoft Azure DNS experienced a service availability issue. This outage resulted in customers not being able to resolve domain names for services. Read more about the outage...
Are You Prepared For a Supply Chain Attack? Why Supply Chain Risk Management is Essential
The world has never been more interconnected, with cloud and digital technology allowing companies to flourish and succeed globally. However, this interconnectedness comes with elevated risk — partners, vendors, and...
Endpoint Detection and Response: All You Need to Know About EDR Security
Endpoints – the laptops, smartphones, and other devices we use on a daily basis – are a favorite target of attackers. They’re everywhere, prone to security vulnerabilities, and difficult to...
Docker vs. Kubernetes
A common crossroad for developers (especially when just starting) concerning containerization is the question of Kubernetes vs Docker. In this post, we will exhaust the fork down to application areas...
Using Salesforce Analytics for GDPR Compliance
That is the total amount in fines imposed by the European Union on businesses for non-compliance to GDPR, data infringement, and breaches on data protection since the launch of the...
Threat Update 32 – Lemon Duck Floats on Exchange ProxyLogon Vulnerability
What’s better than cryptocurrency? FREE cryptocurrency, right? Not if you’re one of the many victims of the Lemon Duck cryptomining botnet who is footing the bill for the “free” (to...
March 2021 Malware Trends Report
This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to...