Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Cybersecurity News


Threat Update 53 – ProxyShell and PetitPotam and Ransomware… Oh My!

Technology grows, evolves, and changes over time, but most organizations often need to support legacy systems. In the Microsoft world, this typically means keeping legacy authentication protocols like NTLM authentication...

Read More

Threat Update 52 – 2021 SaaS Risk Report

Cloud solutions have changed the way we do business, allowing organizations to leverage the scale and flexibility of SaaS, and IaaS platforms, and support an increasingly mobile “work from anywhere...

Read More

Threat Update 50 – Critical Salesforce Misconfiguration

Salesforce is the lifeblood of many organizations. The amount of critical, and sensitive information stored within is astronomical – however, there are parts of the solution designed to be accessed...

Read More

Abusing Misconfigured Salesforce Communities for Recon and Data Theft

A misconfigured Salesforce Community may lead to sensitive Salesforce data being exposed to anyone on the internet. Anonymous users can query objects that contain sensitive information such as customer lists,...

Read More

2021 SaaS Risk Report Reveals 44% of Cloud Privileges are Misconfigured

Cloud apps make collaboration a breeze, but unless you’re keeping a close watch on identities, behavior, and privileges across each and every SaaS and IaaS you rely on, you’re a...

Read More

REvil Ransomware Attack on Kaseya VSA: What You Need to Know

On July 3rd, at 10:00 AM EST, a malicious hotfix was released and pushed by Kaseya VSA servers that propagated to servers managed by Kaseya, resulting in the compromise and...

Read More

Threat Update 42 – Hidden Costs of a Breach

The American Accounting Association performed a study on how data breaches impact businesses beyond the immediate costs of recovery and brand damage. Join Kilian and Kyle Roth from the Varonis...

Read More

Threat Update 40 – White House White Hat

In response to what seems like an endless barrage of cyberattacks, President Biden signed an executive order outlining steps to improve the nation’s cybersecurity posture. Key items include implementing a...

Read More

April 2021 Malware Trends Report

This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to...

Read More

Threat Update 36 – A Supply Chain Attack By Any Other Name

The SolarWinds supply chain attack was seen as a wake-up call for many in business, IT, and security. Both attackers & defenders took notice of the attack’s effectiveness, and created...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.