-
Threat ResearchMay 20, 2026
GitHub Breach via Malicious VS Code Extension: What You Need to Know
GitHub's breach, caused by a malicious VS Code extension, exposed 3,800 internal repositories. Learn how to secure your environment.
Chen Levy Ben Aroy
3 min read
-
Threat ResearchMay 19, 2026
GhostTree: Unveiling Path Manipulation Techniques to Bypass Windows Security
Varonis Threat Labs discovered a new technique that abuses NTFS junctions to generate infinite file paths, causing EDR products to hang and leave files unscanned.
Dolev Taler
3 min read
-
Threat ResearchMay 11, 2026
Feeding Frenzy: RCE on Azure Cosmos for PostgreSQL
See how an Azure Cosmos for PostgreSQL vulnerability enabled remote code execution, its implications, and essential security best practices.
Coby Abrams
4 min read
-
Threat ResearchMay 08, 2026
Canvas Attackers Compromise 275M Students, Teachers, and Staff
The Canvas breach reveals how cybercriminals are targeting education: learn how the attack unfolded, what data was exposed, and the risks ahead.
Joseph Avanzato
3 min read
-
AI Security Threat ResearchApr 29, 2026
Meet Bluekit: The AI-Powered All-in-One Phishing Kit
Discover Bluekit, the AI-driven phishing kit that centralizes phishing operations with advanced features like automated domain registration and an AI Assistant.
Daniel Kelley
3 min read
-
Threat ResearchApr 22, 2026
The "Success" Illusion: How Cross-Tenant ROPC Can Gaslight Your SOC and Poison Data
Discover how attackers exploit cross-tenant ROPC to create misleading login events, undermining your security and data integrity without breaching your systems.
Hai Vaknin
3 min read
-
Threat ResearchApr 20, 2026
The Vercel Breach: Steps To Protect Your Organization
Vercel disclosed a major breach exposing customer environment secrets via a compromised AI tool. Learn what happened, why it matters, and the steps to protect your organization.
Chen Levy Ben Aroy
3 min read
-
Threat ResearchApr 17, 2026
The Invisible Footprint: How Anonymous S3 Requests Evade AWS Logging
Learn how anonymous S3 requests evaded AWS CloudTrail logging via VPC endpoints, the risks to enterprises, and how AWS addressed the issue.
Maya Parizer
4 min read
-
AI Security Threat ResearchApr 13, 2026
Deep Dive into Architectural Vulnerabilities in Agentic LLM Browsers
Varonis Threat Labs investigated Comet, OpenAI Atlas, Edge Copilot, and Brave Leo to understand how LLM browsers work and where attackers can break them.
Itay Yashar
14 min read
-
Threat ResearchApr 03, 2026
A Look Inside Claude's Leaked AI Coding Agent
A Varonis Threat Labs breakdown of Anthropic’s Claude Code leak, uncovering the AI coding agent’s architecture, guardrails, and attack surface.
Varonis Threat Labs
4 min read
-
Threat ResearchApr 01, 2026
A Quiet "Storm": Infostealer Hijacks Sessions, Decrypts Server-Side
Meet Storm, a new infostealer that tiptoes around endpoint security tools, remotely decrypts browser credentials, and lets operators restore hijacked sessions.
Daniel Kelley
3 min read
-
Cloud Security Threat ResearchMar 25, 2026
Varonis Discovers Local File Inclusion in AWS Remote MCP Server via CLI Shorthand Syntax
Varonis uncovers a local file inclusion vulnerability in the AWS Remote MCP Server, exposing how authenticated access can lead to sensitive data exposure.
Coby Abrams
2 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital