Varonis Adds Data Classification Support for Amazon S3. Learn More

Skip navigation
  • Platform
    • Products
    • Overview
    • Data Protection
      • > DatAdvantageData audit & protection
      • > Automation EngineData remediation
      • > DataPrivilegeData access governance
      • > Data Transport EngineAutomated policy enforcement
    • Threat Detection & Response
      • > DatAlertData-centric UBA
      • > EdgePerimeter detections for DatAlert
      • > Varonis for Active DirectoryAnomaly detection & hardening
    • Privacy & Compliance
      • > Data Classification EngineSensitive data discovery
      • > Policy PackGDPR & CCPA discovery policies
      • > Federal Policy PackTop secret & CUI discovery policies
      • > Data Classification LabelsSensitive data labeling
      • > DatAnswersDSARs, e-Discovery, PII search
    • Cloud Security
      • > DatAdvantage CloudSaaS & IaaS Security
      • > Data Classification CloudSensitive data discovery
      • > Varonis for Microsoft 365Data-centric security for M365
      • > Varonis for SalesforceData-centric security for Salesforce
    • See all products
    •  
    • Learn more
    • How It Works
    • Integrations
    • Third-party Apps
    • Pricing
  • Solutions
    • By Industry
      • Finance
      • Healthcare
      • Federal Government
      • Education
      • Manufacturing
      • State & Local Government
    • By Use Case
      • Cloud Data Protection
      • SaaS Security Posture Management
      • Data Classification
      • Data Loss Prevention
      • Data Privacy & DSARs
      • Insider Risk Management
      • Ransomware Prevention
      • Zero Trust
    • By Technology
      • > Microsoft 365
      • > Windows File Shares
      • > Active Directory
      • > Google Drive
      • > Salesforce
      • > Nasuni
      • > UNIX/Linux
      • > Box
      • > AWS
      • > Okta
      • > GitHub
      • > NetApp
      See all integrations
  • Why Varonis?
    • Case Studies
    • Operational Plan
    • Industry Recognition
    • Customer Success
    • IR & Forensics Team
    • Measurable ROI
  • Company
    • About Varonis
    • Careers
    • Investor Relations
    • Press
    • Corporate Responsibility
    • Trust & Security
    • Brand
    • Contact Us
  • Partners
    • Partner Program
    • Partner Locator
    • Partner Portal
    • Service Providers
    • Technology Partners
  • Resources
    • Support
    • Resource Library
    • Blog
    • Free Security Courses
    • Product Training
    • SecurityFWD
    • Webinars
    • Events
  • Contact Us
    • Get support
    • +1 (877) 292-8767
  • Contact us
    • Get a demo
    • Get support
    • +1 (877) 292-8767

Inside Out Security

  • English
  • French
  • German
  • Portuguese - Brazil
  • Russian
Featured | Threat Research |

Clock for time it takes to read article 6 min read

Spoofing SaaS Vanity URLs for Social Engineering Attacks

Many SaaS applications offer what’s known as vanity URLs — customizable web addresses for landing pages, file-sharing links, etc. Vanity URLs allow you to create a personalized...
Tal Peleg
By Tal Peleg

Latest posts

Privacy & Compliance |

June 30, 2022

SOX Compliance Checklist & Audit Preparation Guide
David Harrington
By David Harrington
Data Security |

June 30, 2022

IDS vs. IPS: What Organizations Need to Know
Josue Ledesma
By Josue Ledesma
Data Security |

June 30, 2022

How a Doggo Can Teach You the Difference Between Salesforce Objects and Records
Kilian Englert
By Kilian Englert
Data Security |

June 30, 2022

DNS over HTTPS as a covert Command and Control channel
Masha Garmiza
By Masha Garmiza
Data Security |

June 29, 2022

What is Red Teaming? Methodology & Tools
David Harrington
By David Harrington
Data Security |

June 29, 2022

What is a Security Policy? Definition, Elements, and Examples
Robert Grimmick
By Robert Grimmick
Data Security |

June 29, 2022

What is Open XDR? Benefits and Security Comparisons
Josue Ledesma
By Josue Ledesma
Data Security |

June 25, 2022

What is Traceroute? How It Works and How to Read Results
Robert Grimmick
By Robert Grimmick
Ransomware |

June 25, 2022

Ryuk Ransomware: Breakdown and Prevention Tips
David Harrington
By David Harrington
Data Security |

June 24, 2022

What is an Insider Threat? Definition and Examples
Robert Grimmick
By Robert Grimmick
Prev 1 2 3 4 5 Next
  • English
  • Deutsch
  • Français
  • Português - Brasil
  • Русский
  • Legal
  • |
  • Trust
  • Legal
  • |
  • Trust
© 2022
Varonis