Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Cybersecurity News

Articles

Threat Update 26 – Living with Supply Chain Attacks

For years, security professionals have warned that you have to assume you’re breached, but the Solarwinds supply chain attack really brought this into focus for many organizations. Unfortunately, this is...

Read More

February 2021 Malware Trends Report

This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to...

Read More

Threat Update #25 – HelloRansomware: A Look at the CD Projekt Red Attack

Love hacking in Cyberpunk? So do we! What about in real life? Not so much! Join Kilian Englert and Ryan O’Boyle from the Varonis Incident Response team as they discuss...

Read More

Threat Update 23 – Bypassing Endpoint Controls Using Office Macros

So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls! Don’t believe us? Check out this...

Read More

Threat Update 21 – SolarLeaks

The initial news of the SolarWinds supply chain attack was a devastating revelation to many organizations. It didn’t take the cybercriminal world long to try to profit off of this...

Read More

SolarWinds SUNBURST Backdoor: Inside the Stealthy APT Campaign

Imagine if everyone with an Amazon Echo in their home had to assume it’s been unlocking their doors and letting a thief inside for the past 6 months. How would you...

Read More

November 2020 Malware Trends Report

This Malware Trends Report – November 2020 is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples....

Read More

Watch: Varonis ReConnect! Defending Against Today’s Spookiest Malware

Mummy Spider, Gh0st Rat, Gothic Panda — if you’re interested in learning how threat actors get their names, how they operate and what you can do to protect your company,...

Read More

The 2021 Financial Data Risk Report Reveals Every Employee Can Access Nearly 11 Million Files

Financial services organizations must safeguard tons of highly sensitive information, but data is often left exposed to far too many people. If just one employee clicks on a phishing email,...

Read More

Threat Update #12 – Does Zerologon Change the Game?

Cybercriminals are using the Zerologon exploit to fast track lateral movement and privilege escalation. If left unpatched, the exploit lets attackers use the password of the primary domain controller to...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.