Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Data Security


Threat Update 30 – No trust? No problem! An Overview of Zero Trust

With the constant barrage of cyberattacks in the news, it would be natural to wonder if there’s a security model to help. Enter Zero Trust! This popular security model has...

Read More

Detecting Honeypot Access With Varonis

Honeypots are traps that the Blue Team (defenders) plant to catch potentially bad actors trying to exploit a vulnerability, snoop for data, or escalate privileges. Since a honeypot is a decoy,...

Read More

Attack lab: Spear Phishing with Google Drive Sharing

Phishing scams are as old as the internet—tricking victims into divulging important information about themselves and their accounts. These scams are so common that all of the major email providers...

Read More

Threat Update 27 – Concentrations of Power

Why are there certain account types that are often targeted by attackers? Why can it be really difficult to detect certain types of account misuse? What are some of the...

Read More

Varonis Veterans Spotlight: Georgi Georgiev

Welcome to the Varonis Veteran Spotlight! The purpose of this spotlight is to show our gratitude and appreciation for our Varonis Veterans, as well as honor their military service and...

Read More

Your Primer to Third-Party Risk Management

Third-party risk management is an essential part of a company’s cybersecurity strategy but one that doesn’t often get the attention (or resources) it needs. But if it’s ignored, enterprises are...

Read More

February 2021 Malware Trends Report

This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to...

Read More

What Federal Agencies Should Take Away from SolarWinds Attack

It was one of those fragile, oversized wine glasses that couldn’t have cost more than a buck. I saw it teetering on the counter’s edge, soon to meet the kitchen...

Read More

How Hackers Spoof DNS Requests With DNS Cache Poisoning

Domain Name Server (DNS) Spoofing is a cyber attack that tricks your computer into thinking it’s going to the correct website, but it’s not. Attackers use DNS cache poisoning to...

Read More

IPv6 Security Guide: Do you Have a Blindspot?

IPv6, the most recent iteration of the ubiquitous Internet Protocol, promises to solve a forthcoming shortfall of available IP addresses. But the latest generation of IP will also have profound...

Read More

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.