-
Threat ResearchOct 30, 2025
The Silent Attackers: Exploiting VPC Endpoints to Expose AWS Accounts of S3 Buckets Without a Trace
Learn how a CloudTrail flaw revealed IDs via VPC endpoints and how to protect your cloud.
Maya Parizer
5 min read
-
Threat ResearchOct 28, 2025
Meet Atroposia: The Stealthy Feature-Packed RAT
Atroposia is a stealthy RAT with HRDP, credential theft, DNS hijacking & fileless exfiltration — aka cybercrime made easy for low-skill attackers.
Daniel Kelley
5 min read
-
Azure Cloud Security Threat ResearchOct 21, 2025
Azure App-Mirage: Bypassing Application Impersonation Safeguard
Varonis Threat Labs discovered a loophole allowing attackers to impersonate Microsoft applications by creating malicious apps with deceptive names.
Tomer Basin
5 min read
-
Threat ResearchOct 09, 2025
From CPU Spikes to Defense: How Varonis Prevented a Ransomware Disaster
Discover how Varonis' advanced threat response ensured zero downtime and complete remediation when stopping a ransomware attack.
Joseph Avanzato
5 min read
-
Ransomware Threat ResearchOct 01, 2025
ForcedLeak and the Future of AI Agent Security
ForcedLeak exposes Salesforce Agentforce to silent CRM data theft via prompt injection, agent overreach, and CSP misconfig. Mitigate now.
Daniel Miller
3 min read
-
Threat ResearchSep 30, 2025
MatrixPDF Puts Gmail Users at Risk with Malicious PDF Attachments
Discover how PDF-based malware attacks work and how AI-powered email security can detect and block threats before they reach your inbox.
Daniel Kelley
5 min read
-
Email Security Threat ResearchSep 29, 2025
The Fake Bureau of Investigation: How Cybercriminals Are Impersonating Government Pages
The FBI is noticing a large uptick in fraudulent websites impersonating the IC3. Learn how users are unsuspectingly reporting cybercrime to cybercriminals.
Shawn Hays
4 min read
-
Cloud Security Threat ResearchSep 25, 2025
Where Are my Keys?! Ransomware Group Steals AWS Keys to Advance
Ransomware groups now target AWS control planes using stolen keys and Pacu. Learn how Varonis detects, investigates, and stops these cloud threats.
Simon Biggs
5 min read
-
Threat ResearchSep 17, 2025
BIDI Swap: Unmasking the Art of URL Misleading with Bidirectional Text Tricks
Varonis reveals a decade-old Unicode flaw that enables BiDi URL spoofing and poses phishing risks. Learn how attackers exploit RTL/LTR scripts and browser gaps.
Dolev Taler
3 min read
-
AI Security Threat ResearchSep 10, 2025
AI-Generated Phishing: How One Email Triggered a Global NPM Supply Chain Crisis
A massive phishing-led NPM attack compromised popular packages with 2.67B weekly downloads, hijacking crypto wallets via stealthy AI-generated emails.
Varonis Threat Labs
5 min read
-
AI Security Threat ResearchSep 08, 2025
SpamGPT: The AI Tool Elevating Email Security Threats for Enterprises
SpamGPT is a new AI-powered email attack tool that is changing the way businesses address email security issues. Learn how this technology makes phishing attacks more effective and how to protect your company's email systems ahead of time.
Daniel Kelley
3 min read
-
Threat ResearchSep 04, 2025
Cyber Resilience Assessment: Identifying Detection Gaps and Strengthening Security
Validate your security tools with a real-world attack simulation that reveals detection gaps and boosts your cyber resilience.
Seth Priestner
2 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital