Security Bulletins
Varonis Threat Update #8
Oct 09, 2020
Emotet and Ryuk attacks are coming fast and furious, and they’re highly damaging. We’re seeing a huge surge in ransomware worldwide as criminal groups amp up their efforts to grab...
How Varonis Helps Stop Emotet
Sep 28, 2020
Our incident response team is tracking an unprecedented number of Emotet malware infections. This post will cover indicators of compromise, mitigations, and how Varonis can help you detect and stop Emotet at each phase of an attack.
Getting the Most Out of Data Transport Engine
Jun 24, 2020
If you don’t need it, get rid of it. If it’s sensitive, make sure sure it’s in the right place, and only accessible to those who need it. Old files...
Working With Windows Local Administrator Accounts, Part II
Jun 19, 2020
Before we delve into Restricted Groups, I thought it might be worthwhile to take a closer look at how hackers take advantage of Administrator passwords. For Pass-the-Hash fans, this post...
Finding EU Personal Data With Regular Expressions (Regexes)
Jun 19, 2020
If there is one very important but under-appreciated point to make about complying with tough data security regulations such as the General Data Protection Regulation (GDPR), it’s the importance of finding...
Varonis Exposes Global Cyber Campaign: C2 Server Actively Compromising Thousands of Victims
Jun 17, 2020
The Varonis Security Research team discovered a global cyber attack campaign leveraging a new strain of the Qbot banking malware. The campaign is actively targeting U.S. corporations but has hit networks...
Introducing Varonis Data Security Platform 6.4.100: Varonis Edge, GDPR Threat Models, Geolocation and More
Jun 17, 2020
It’s the beginning of a new year, and we have a huge new beta release to share with you. The beta release of the Varonis Data Security Platform 6.4.100 dropped...
Varonis DataPrivilege and RSA® Identity Governance and Lifecycle
Jun 17, 2020
We’re thrilled to announce interoperability between Varonis DataPrivilege and RSA® Identity Governance and Lifecycle, with a new Implementation Blueprint. This Implementation Blueprint will help the business to quickly detect security...
2019 Data Risk Report Stats and Tips You Won’t Want to Miss
Jun 17, 2020
Our data risk report analyzed over 54 billion files across 30+ industries for the latest insights, stats and tips to improve your data security practices
Capital One's Cloud Breach & Why Data-Centric Security Matters
Jun 17, 2020
Capital One’s breach of more than 100 million customer records is making headlines around the world. The sheer number of stolen records, including social security numbers, credit card applications, and...
The Complete Azure Compliance Guide: HIPAA, PCI, GDPR, CCPA
May 05, 2020
Achieving compliance with HIPAA, PCI, GDPR, and CCPA regulations in your Azure system can be complex. In this guide, we’ll show you how.
Azure Skeleton Key: Exploiting Pass-Through Auth to Steal Credentials
Apr 22, 2020
EDIT: Security researcher Adam Chester had previously written about Azure AD Connect for Red Teamers, talking about hooking the authentication function. Check out his awesome write-up here. Should an attacker...
Try Varonis free.
Deploys in minutes.