-
Threat ResearchFeb 07, 2023
VMware ESXi in the Line of Ransomware Fire
Servers running the popular virtualization hypervisor VMware ESXi have come under attack from at least one ransomware group over the past week, likely following scanning activity to identify hosts with Open Service Location Protocol (OpenSLP) vulnerabilities.
Jason Hill
10 min read
-
Varonis ProductsFeb 07, 2023
Varonis Enhances GitHub Security Offering With Secrets Discovery and Data Classification
Varonis is extending our world-class data classification capabilities to discover secrets, keys, and other sensitive data embedded in your GitHub repositories and source code.
Nathan Coppinger
3 min read
-
Varonis ProductsJan 26, 2023
Automated Posture Management: Fix Cloud Security Risks with One-Click
Automated posture management helps teams spot and fix cloud security gaps fast, reducing misconfigurations and improving overall protection.
Nathan Coppinger
4 min read
-
Threat ResearchJan 23, 2023
CrossTalk and Secret Agent: Two Attack Vectors on Okta's Identity Suite
Varonis Threat Labs discovered and disclosed two attack vectors on Okta's identity suite: CrossTalk and Secret Agent.
Tal Peleg and Nitay Bachrach
7 min read
-
Varonis ProductsJan 17, 2023
How To Automate Least Privilege for Microsoft 365, Google Drive, and Box
See how automating least privilege cuts hidden access risks and strengthens security across growing cloud environments.
Yumna Moazzam
6 min read
-
DSPM Varonis ProductsJan 03, 2023
Varonis Launches Customizable Data Security Posture Management (DSPM) Dashboard
Varonis introduces a new customizable DSPM dashboard to help improve data security posture management
Nathan Coppinger
3 min read
-
RansomwareDec 01, 2022
Four Must-Know Cyber Tips for Your Business
The real story behind today’s breaches is never about an isolated bad decision—it’s about the many decisions made long before a sleepy network administrator gets a call from an attacker.
Yaki Faitelson
3 min read
-
Threat ResearchNov 15, 2022
Varonis Threat Labs Discovers SQLi and Access Flaws in Zendesk
Varonis Threat Labs found a SQL injection vulnerability and a logical access flaw in Zendesk Explore, the reporting and analytics service in the popular customer service solution, Zendesk.
Tal Peleg
3 min read
-
Data SecurityNov 02, 2022
How to Investigate NTLM Brute Force Attacks
Explore the process the Varonis Incident Response team follows to investigate NTLM Brute Force attacks, which are common incidents reported by customers.
Matt Schiff
7 min read
-
Threat ResearchOct 25, 2022
The Logging Dead: Two Event Log Vulnerabilities Haunting Windows
You don’t have to use Internet Explorer for its legacy to have left you vulnerable to LogCrusher and OverLog, a pair of Windows vulnerabilities discovered by the Varonis Threat Labs team.
Dolev Taler
4 min read
-
Varonis ProductsOct 24, 2022
Automate Data Security With Varonis Data-centric Insights and Cortex XSOAR
Discover how to leverage Varonis data risk insights with Cortex XSOAR to accelerate investigations.
Yumna Moazzam
2 min read
-
Cloud SecurityOct 14, 2022
What is IDOR (Insecure Direct Object Reference)?
Insecure Direct Object References (IDOR) are common, potentially devastating vulnerabilities resulting from broken access control in web applications.
Robert Grimmick
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital