COVID-19 Threat Update #1

Varonis sees the highest number of VPN and O365 events ever recorded across customer base. Click to watch our security experts discuss what they’re seeing on the front lines, and what...
1 min read
Last updated January 17, 2023

Varonis sees the highest number of VPN and O365 events ever recorded across customer base.

Click to watch our security experts discuss what they’re seeing on the front lines, and what folks can do.

Video Thumbnail
2:43

 

What does this mean for security?  

Organizations are scrambling to get newly home-bound employees up and running.  

We’vgot anxious employees working from vulnerable home networks, and many organizations don’t have as much visibility into their remote connections and data as they’ll need. With the expanded attack surface, responding to incidents isn’t getting any easier.  

Corporate laptops are in short supply, so organizations are making do with home systems. That’s like fighting in the dark – older or unpatched operating systems and browsers that may not be compatible with endpoint solutions.  

We’re already seeing malicious COVID-19 links sent via email or social that lead to ransomware or browser-only attacks that threaten 365 environments. Here’s an example of a phishing attack that came in this week: 

It’s poorly worded, but still very effective. User clicks; account or browser hijacked.  

If you’d like help understanding what you’re seeing or not seeing, please click here to contact us.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

the-silent-attackers:-exploiting-vpc-endpoints-to-expose-aws-accounts-of-s3-buckets-without-a-trace
The Silent Attackers: Exploiting VPC Endpoints to Expose AWS Accounts of S3 Buckets Without a Trace
Learn how a CloudTrail flaw revealed IDs via VPC endpoints and how to protect your cloud.
meet-atroposia:-the-stealthy-feature-packed-rat
Meet Atroposia: The Stealthy Feature-Packed RAT
Atroposia is a stealthy RAT with HRDP, credential theft, DNS hijacking & fileless exfiltration — aka cybercrime made easy for low-skill attackers.
azure-app-mirage:-bypassing-application-impersonation-safeguard
Azure App-Mirage: Bypassing Application Impersonation Safeguard
Varonis Threat Labs discovered a loophole allowing attackers to impersonate Microsoft applications by creating malicious apps with deceptive names.
what-is-database-activity-monitoring?-dam-explained
What is Database Activity Monitoring? DAM Explained
A critical component of any organization's security strategy, Database Activity Monitoring tools are used by organizations to fulfill compliance criteria and protect sensitive data.