Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more
Blog

Security Bulletins

Threat Update 43 – Ransomware Early Warning: Brute Force

Kilian Englert

Kilian Englert

With the proliferation of more sophisticated, human-operated ransomware, attackers can live inside an organization for days, weeks, or months - finding and exfiltrating data before making their presence known by detonating ransomware.

Threat Update 42 – Hidden Costs of a Breach

Kilian Englert

Kilian Englert

The American Accounting Association performed a study on how data breaches impact businesses beyond the immediate costs of recovery and brand damage.

April 2021 Malware Trends Report

Ben Zion Lavi

Ben Zion Lavi

This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to…

Threat Update 39 – Let Me Google That PII On You

Kilian Englert

Kilian Englert

Cloud collaboration tools like Google Drive are ubiquitous, but in our work from anywhere world, IT and security often face challenges understanding how and where personal accounts intermingle with corporate accounts.

YARA Rules Guide: Learning this Malware Research Tool

Neil Fox

Neil Fox

YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.

Threat Update 36 – A Supply Chain Attack By Any Other Name

Kilian Englert

Kilian Englert

Kilian and Ryan look at a supply chain attack that silently stole cloud credentials for several months before detection.

Threat Update 34 – Isn't the Internet Supposed to be Bombproof?

Kilian Englert

Kilian Englert

Kilian & Ryan dissect what could happen if a major data center went down, and how organizations leveraging cloud technology or solutions can prepare for business continuity.

Threat Update 33 – S3 Security Suggestions & Cyber Insurance Targets

Kilian Englert

Kilian Englert

Kilian, and Ryan from the Varonis Incident Response Team discuss controls to detect ransomware threats quickly while potentially lowering cyber insurance premiums.

Threat Update 32 - Lemon Duck Floats on Exchange ProxyLogon Vulnerability

Kilian Englert

Kilian Englert

Hear how the Lemon Duck cryptomining botnet targets Exchange servers vulnerable to ProxyLogon.

The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees

Rachel Hunt

Rachel Hunt

The Varonis 2021 Healthcare Data Risk Report found 20% of all files at hospitals, biotech firms and pharma companiesare open to every employee.

Threat Update 31 – Now are the Zero Days of our Discontent

Kilian Englert

Kilian Englert

Three new Zero Day vulnerabilities recently discovered in F5 products, and Microsoft Office 365 let attackers skip the password and authentication completely.

How to Use Autoruns to Detect and Remove Malware on Windows

Neil Fox

Neil Fox

This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.