Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Threat Detection

Articles

Varonis extends security capabilities to Nutanix Files

The Varonis Data Security Platform now supports monitoring, alerting, and data classification in Nutanix Files, providing increased visibility and security over unstructured data. Monitor and secure Nutanix Files with Varonis...

Read More

Threat Update 49 – SeriousSAM & Black Hat 2021

Cybersecurity folks find themselves in a “Zero-Daze” as they get hit with another new 0-day attack, called SeriousSAM, that allows attackers to get access to the Windows Security Account Manager...

Read More

Threat Update 47 – Ransomware Early Warning: Data Exfiltration

Thought ransomware couldn’t get any worse? Ransomware gangs are now stealing victim’s data before unleashing ransomware – forcing victims to pay up or deal with the fallout when attackers post...

Read More

Threat Update 46 – Ransomware Early Warning: Data Discovery

Breaking News: The REvil ransomware gang launched an attack over the U.S. long holiday weekend. Varonis presented a webinar on the attack and you can check out this detailed breakdown...

Read More

Threat Update 45 – Ransomware Early Warning: AD Attacks

Once ransomware gangs establish a foothold in an organization, the next move is often to compromise additional accounts and escalate their privileges — which puts Active Directory squarely in their...

Read More

Threat Update 44 – Ransomware Early Warning: DNS Recon

Ransomware gangs use every trick in the book to find and steal data before encrypting it. After landing in a new organization, they need to map out the resources, identify...

Read More

ReConnect – Meet DatAdvantage Cloud

Varonis introduced an exciting new cloud-hosted solution that brings our data-centric security approach to AWS, Box, GitHub, Google Drive, Jira, Okta, Salesforce, Slack, and Zoom! Kilian Englert and Ryan O’Boyle...

Read More

Threat Update 43 – Ransomware Early Warning: Brute Force

With the proliferation of more sophisticated, human-operated ransomware, attackers can live inside an organization for days, weeks, or months – finding and exfiltrating data before making their presence known by...

Read More

Process Hacker: Advanced Task Manager Overview

Process Hacker is a great tool for monitoring and investigating processes created by a piece of malware. It is a popular malware analysis tool amongst security professionals as it can...

Read More

Cuckoo Sandbox Overview

A Cuckoo Sandbox is an open-source tool that can be used to automatically analyze malware. Imagine, it’s 2 am in the Security Operations Center (SOC) and an alert has triggered...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.