-
Threat ResearchAug 29, 2025
Hidden in Plain Sight: A Misconfigured Upload Path That Invited Trouble
A misconfigured upload path exposed a Linux web server to attack. Varonis Threat Labs reveals how it happened and how to prevent future breaches.
Siddharth Jain
5 min read
-
Data Security SalesforceAug 27, 2025
Anatomy of a Salesforce Data Breach: Stopping User Impersonation
How a bad actor systematically impersonates users to exfiltrate millions of Salesforce records.
Nolan Necoechea
3 min read
-
Cloud SecurityAug 20, 2025
The Cloud Threat Playbook: Catching What Posture Tools Miss
Identity is the new perimeter. Learn how Varonis stops cloud breaches by resolving access, detecting threats, and automating least privilege.
Daniel Miller
4 min read
-
Data Security FederalAug 18, 2025
Why Data-Centric Security is Important for the DoD
Learn how Varonis protects DoD environments by utilizing various approaches to secure sensitive data.
Patrick Long
3 min read
-
AI Security Threat ResearchAug 14, 2025
Understanding and Defending Against the Model Context Protocol DNS Rebind Attack
As organizations increasingly rely on MCP servers to bridge AI capabilities with business systems, understanding and defending against threats is critical.
Varonis Threat Labs
6 min read
-
AI Security HealthcareAug 13, 2025
From Rome to Radiology: Italy’s Response to AI Risks in Healthcare
Italy is addressing AI risks in healthcare, recently giving clear data protection decrees from the Garante per la protezione dei dati personali.
Shawn Hays
4 min read
-
AI SecurityAug 12, 2025
AI Deepfakes and Voice Clones Put Identity Security First
AI deepfakes and voice clones are powering identity attacks like OTP fraud, KYC bypasses, CEO impersonation, and fake hiring schemes.
Daniel Kelley
5 min read
-
Cloud Security Threat ResearchAug 11, 2025
Rusty Pearl: Remote Code Execution in Postgres Instances
Varonis uncovers an RCE vulnerability in PostgreSQL via PL/Perl and PL/Rust. Learn how AWS RDS responded and how to secure your Postgres environment.
Tal Peleg
6 min read
-
Data Security Microsoft 365 Threat ResearchAug 05, 2025
Varonis Incident Response: Stopping Microsoft 365 Direct Send Abuse
Learn how Varonis Threat Labs uncovered a critical Microsoft 365 Direct Send exploit, and how organizations leveraged Varonis Incident Response to protect themselves from attack.
Brian Walsh
2 min read
-
Varonis ProductsJul 31, 2025
What’s New in Varonis: July 2025
Discover Varonis' latest features, including database activity monitoring, CSPM enhancements, Salesforce access graph, and more.
Nathan Coppinger
3 min read
-
AI SecurityJul 28, 2025
ChatGPT DLP: What Enterprises Need to Know
Learn how to prevent data leaks from ChatGPT with AI-specific DLP strategies covering risk, policy, controls, and compliance for secure enterprise AI use.
Jonathan Villa
7 min read
-
Varonis ProductsJul 28, 2025
Overview of Next-Gen Database Activity Monitoring
Reinventing Database Security: A simple, agentless solution to database security and compliance built for the AI era.
Eugene Feldman
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital