December 1, 2025
Understanding Business Email Compromise (BEC): Threat Types and Defense Strategies-
Privacy & ComplianceApr 30, 2020
Is Microsoft Office 365 HIPAA Compliant?
Microsoft Office 365 is growing in popularity, but it can present some challenges to HIPAA compliance. Read on to learn more about Office 365 HIPAA compliance
Michael Buckbee
5 min read
-
Data SecurityApr 24, 2020
COVID-19 Threat Update #5
The race to enable remote work sent IT and security teams into high gear — and often resulted in shortcuts that exposed organizations to incredible risk in the process. Hackers...
Kilian Englert
1 min read
-
Data Security Threat ResearchApr 22, 2020
Azure Skeleton Key: Exploiting Pass-Through Auth to Steal Credentials
We created a proof-of-concept that manipulates the Azure authentication function to give us a ‘skeleton key’ password that will work for all users, and dump all real clear-text usernames and passwords into a file.
Eric Saraga
6 min read
-
Data SecurityApr 15, 2020
Hackers Take Aim at Home WiFi Networks
Millions of people are working remotely – and attackers are taking advantage. As more workers log into residential WiFi networks, cybercriminals have plenty of opportunities to launch attacks. Varonis security...
Rachel Hunt
1 min read
-
Data SecurityApr 06, 2020
What is PGP Encryption and How Does It Work?
PGP is an encryption method that provides security and privacy for online communications — we’ll look at how PGP encryption works and how you can use it
Michael Buckbee
9 min read
-
Data SecurityApr 06, 2020
COVID-19 THREAT UPDATE #4
Millions of remote workers are accessing cloud services and using VPNs to maintain business continuity. But attackers are pivoting to gain the upper hand. Click to watch Matt Radolec and...
Kilian Englert
1 min read
-
Data SecurityApr 01, 2020
What is Fileless Malware? PowerShell Exploited
Fileless malware uses PowerShell to steal valuable data and inject malicious code into your systems. In this guide, we’ll show you how to protect yourself.
Michael Buckbee
8 min read
-
Data SecurityMar 31, 2020
COVID-19 Threat Update #3
If you’re reading this, there’s a good chance you’ve become one of the millions of employees forced to work from home during the coronavirus crises. Accessing your emails and files...
Kilian Englert
1 min read
-
Active DirectoryMar 29, 2020
Active Directory Users and Computers (ADUC): Installation and Uses
Active Directory Users and Computers (ADUC) is a MMC snap-in you can use to manage Active Directory. Read on for more details, use cases, and caveats.
Michael Buckbee
4 min read
-
Data SecurityMar 29, 2020
Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses
It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP),...
Michael Buckbee
5 min read
-
Data SecurityMar 29, 2020
CryptoLocker: Everything You Need to Know
CryptoLocker is a type of malware that encrypts files, holding them for ransom. For this reason, CryptoLocker and its variants have come to be known as “ransomware.”
Michael Buckbee
5 min read
-
Privacy & ComplianceMar 29, 2020
How Varonis Helps With ITAR Compliance
International Traffic in Arms Regulations (ITAR) mandates that access to physical materials or technical data related to defense and military technologies is restricted to US citizens only. According to the US...
Jesse Rosenbaum
2 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital