Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Articles by

Rachel Hunt

Threat Update #14 – Post-Ransomware Recovery

To stop ransomware, every second counts. But once the threat is contained, the race is on to get  back up and running after a ransomware incident. Click to watch Kilian...

Read More

Watch: Varonis ReConnect! Defending Against Today’s Spookiest Malware

Mummy Spider, Gh0st Rat, Gothic Panda — if you’re interested in learning how threat actors get their names, how they operate and what you can do to protect your company,...

Read More

The 2021 Financial Data Risk Report Reveals Every Employee Can Access Nearly 11 Million Files

Financial services organizations must safeguard tons of highly sensitive information, but data is often left exposed to far too many people. If just one employee clicks on a phishing email,...

Read More

Threat Update #13 – Slashing exposed data to survive ransomware attacks

As if ransomware weren’t bad enough, global group access raises risk exponentially. Once attackers land on a network, they can open, copy, change, or delete any and all files left...

Read More

Threat Update #12 – Does Zerologon Change the Game?

Cybercriminals are using the Zerologon exploit to fast track lateral movement and privilege escalation. If left unpatched, the exploit lets attackers use the password of the primary domain controller to...

Read More

Threat Update #11 – Attack Attribution

In cybersecurity, incident response is the big game and analysis is the postgame wrap-up. After the threat is contained, security investigators can dive into what they’ve found to look for...

Read More

Watch: Varonis ReConnect!

Office 365 and Teams make sharing information and collaborating with distant colleagues a breeze. But if you’re not careful, you’ll open yourself up to considerable risk. That’s because securing your...

Read More

Threat Update #10

An alert notifies you that something suspicious is going on. Minutes matter, so you call the Varonis Incident Response team to help. Security investigators must act fast, but where do...

Read More

Varonis Threat Update #9

When ransomware strikes, minutes matter. But an attack may not always be what it seems. That’s because ransomware can serve as a clever – and effective – smokescreen designed to...

Read More

Varonis Threat Update #8

Emotet and Ryuk attacks are coming fast and furious, and they’re highly damaging. We’re seeing a huge surge in ransomware worldwide as criminal groups amp up their efforts to grab...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.