-
Threat ResearchApr 03, 2026
A Look Inside Claude's Leaked AI Coding Agent
A Varonis Threat Labs breakdown of Anthropic’s Claude Code leak, uncovering the AI coding agent’s architecture, guardrails, and attack surface.
Varonis Threat Labs
4 min read
-
Threat ResearchApr 01, 2026
A Quiet "Storm": Infostealer Hijacks Sessions, Decrypts Server-Side
Meet Storm, a new infostealer that tiptoes around endpoint security tools, remotely decrypts browser credentials, and lets operators restore hijacked sessions.
Daniel Kelley
3 min read
-
Cloud Security Threat ResearchMar 25, 2026
Varonis Discovers Local File Inclusion in AWS Remote MCP Server via CLI Shorthand Syntax
Varonis uncovers a local file inclusion vulnerability in the AWS Remote MCP Server, exposing how authenticated access can lead to sensitive data exposure.
Coby Abrams
2 min read
-
Salesforce Threat ResearchMar 10, 2026
What You Need To Know About Salesforce AuraInspector Attacks
ShinyHunters is abusing misconfigured Salesforce Experience sites to expose sensitive data. Learn how the attack works and how to reduce your risk.
Varonis Threat Labs
2 min read
-
Threat ResearchFeb 24, 2026
1Campaign: A New Cloaking Platform Helping Attackers Abuse Google Ads
1Campaign is a new cloaking platform that helps attackers bypass Google Ads screening, evade security researchers, and keep phishing and crypto drainer pages online longer.
Daniel Kelley
3 min read
-
Data Security Threat ResearchFeb 19, 2026
How Cybercriminals Buy Access: Logins, Cookies, and Backdoors
Explore how cybercriminals buy VPN credentials, infostealer logs, breach databases, and web shells to access networks without writing a single exploit.
Daniel Kelley
4 min read
-
Threat ResearchFeb 12, 2026
Dataflow Rider: How Attackers can Abuse Shadow Resources in Google Cloud Dataflow
Discover how attackers can hijack Google Cloud Dataflow pipelines by manipulating shadow resources and learn how to secure your environment against it.
Tamir Yehuda
6 min read
-
Microsoft 365 Threat ResearchJan 27, 2026
Exfil Out&Look for Logs: Weaponizing Outlook Add-ins for Zero-Trace Email Exfiltration
Varonis Threat Labs reveals how Outlook add-ins in Microsoft 365 can be exploited to exfiltrate sensitive email data without leaving forensic traces.
Hadas Shalev
10 min read
-
Threat ResearchJan 23, 2026
Stanley — A $6,000 Russian Malware Toolkit with Chrome Web Store Guarantee
A new malware toolkit called 'Stanley' spoofs websites while keeping the address bar intact and guarantees Chrome Web Store approval.
Daniel Kelley
4 min read
-
Threat ResearchJan 14, 2026
Reprompt: The Single-Click Microsoft Copilot Attack that Silently Steals Your Personal Data
Varonis Threat Labs discovered a way to bypass Copilot’s safety controls, steal users’ darkest secrets, and evade detection.
Dolev Taler
6 min read
-
Data Security Email Security Ransomware Threat ResearchJan 09, 2026
Cybercrime Predictions for 2026: What We’re Seeing from the Frontlines
Discover how AI-powered cyber threats, malicious LLMs, and advanced phishing are reshaping security and demanding smarter, data-centric defenses in 2026.
Lexi Croisdale
4 min read
-
Threat ResearchDec 28, 2026
MongoBleed (CVE-2025-14847): Risk, Detection & How Varonis Protects You
MongoBleed (CVE‑2025‑14847) is a critical unauthenticated memory-leak vulnerability in MongoDB Server that allows attackers to remotely extract uninitialized heap memory—including sensitive info like credentials.
Chen Levy Ben Aroy
2 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital