Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Articles by

Kilian Englert

ReConnect – Tackling SaaS Security

CISOs face tough choices when it comes to balancing security while getting the most of their cloud solutions. Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team answer...

Read More

Threat Update 60 – Abusing Public Salesforce APIs for Fun & Profit

APIs are designed to facilitate programmatic access for application integrations and data sharing, but simple access misconfigurations in critical solutions like Salesforce can allow attackers to inappropriately access sensitive contacts,...

Read More

Threat Update 59 – GitHub Data Leak Risks

GitHub is a crucial solution for the development community, but its popularity for both business and personal use can lead to accidental data leaks. Kilian Englert and Ryan O’Boyle from...

Read More

Threat Update 57 – Zoom-ing In On Non-Traditional Data Stores

Many people know it’s not safe to send sensitive information in emails, but how many people think about what is said on video conferencing platforms? Kilian Englert and Ryan O’Boyle...

Read More

Threat Update 56 – SSO Imposter: Targeting Box

In the final part of the series, Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team walk through how attackers could target Box. They investigate how an attacker...

Read More

Threat Update 55 – SSO Imposter: Targeting Google

In part two of this three-part series, Kilian Englert and Ryan O’Boyle from the Varonis Cloud Architecture team investigate how an attacker who compromised a single sign-on admin account can...

Read More

Threat Update 54 – SSO Imposter: Intrusion

Virtually every organization leveraging more than a few cloud offerings has a single sign-on solution to simplify the management of their various cloud apps. With a little careful planning, attackers...

Read More

Threat Update 53 – ProxyShell and PetitPotam and Ransomware… Oh My!

Technology grows, evolves, and changes over time, but most organizations often need to support legacy systems. In the Microsoft world, this typically means keeping legacy authentication protocols like NTLM authentication...

Read More

Threat Update 52 – 2021 SaaS Risk Report

Cloud solutions have changed the way we do business, allowing organizations to leverage the scale and flexibility of SaaS, and IaaS platforms, and support an increasingly mobile “work from anywhere...

Read More

Threat Update 51 – LockBit and Insider Threats for Hire

Organizations face threats from all sides – both external attackers trying to get in, and internal “trusted” employees going rogue. It was only a matter of time before these two...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.