Varonis Debuts Trailblazing Features for Securing Salesforce

Learn More

✕
Skip navigation
  • Platform
    • Products
    • Overview
    • Data Protection
      • > DatAdvantageData audit & protection
      • > Automation EngineData remediation
      • > DataPrivilegeData access governance
      • > Data Transport EngineAutomated policy enforcement
    • Threat Detection & Response
      • > DatAlertData-centric UBA
      • > EdgePerimeter detections for DatAlert
      • > Varonis for Active DirectoryAnomaly detection & hardening
    • Privacy & Compliance
      • > Data Classification EngineSensitive data discovery
      • > Policy PackGDPR & CCPA discovery policies
      • > Federal Policy PackTop secret & CUI discovery policies
      • > Data Classification LabelsSensitive data labeling
      • > DatAnswersDSARs, e-Discovery, PII search
    • Cloud Security
      • > DatAdvantage CloudSaaS & IaaS Security
      • > Data Classification CloudSensitive data discovery
      • > Varonis for Microsoft 365Data-centric security for M365
      • > Varonis for SalesforceData-centric security for Salesforce
    • See all products
    •  
    • Learn more
    • How It Works
    • Integrations
    • Third-party Apps
    • Pricing
  • Solutions
    • By Industry
      • Finance
      • Healthcare
      • Federal Government
      • Education
      • Manufacturing
      • State & Local Government
    • By Use Case
      • Cloud Data Protection
      • Data Classification
      • Data Loss Prevention
      • Data Privacy & DSARs
      • Insider Risk Management
      • Ransomware Prevention
      • Zero Trust
    • By Technology
      • > Microsoft 365
      • > Windows File Shares
      • > Active Directory
      • > Google Drive
      • > Salesforce
      • > Nasuni
      • > UNIX/Linux
      • > Box
      • > Slack
      • > Okta
      • > GitHub
      • > NetApp
      See all integrations
  • Why Varonis?
    • Case Studies
    • Operational Plan
    • Industry Recognition
    • Customer Success
    • IR & Forensics Team
    • Measurable ROI
  • Company
    • About Varonis
    • Careers
    • Investor Relations
    • Press
    • Corporate Responsibility
    • Trust & Security
    • Brand
    • Contact Us
  • Partners
    • Partner Program
    • Partner Locator
    • Partner Portal
    • Service Providers
    • Technology Partners
  • Resources
    • Support
    • Resource Library
    • Blog
    • Free Security Courses
    • Product Training
    • SecurityFWD
    • Webinars
    • Events
  • Contact Us
    • Get support
    • +1 (877) 292-8767
  • Contact us
    • Get a demo
    • Get support
    • +1 (877) 292-8767

Inside Out Security

Inside Out Security / Threat Research

Threat Research

Latest posts

Featured | Threat Research |

May 11, 2022

Spoofing SaaS Vanity URLs for Social Engineering Attacks
Tal Peleg
By Tal Peleg
Threat Research |

April 19, 2022

Hive Ransomware Analysis
Nadav Ovadia
By Nadav Ovadia
Threat Research |

March 29, 2022

Defending Your Cloud Environment Against LAPSUS$-style Threats
Nathan Coppinger
By Nathan Coppinger
Threat Research |

March 11, 2022

Is this SID taken? Varonis Threat Labs Discovers Synthetic SID Injection Attack
Eric Saraga
By Eric Saraga
Threat Research |

March 4, 2022

ContiLeaks: Ransomware Gang Suffers Data Breach
Jason Hill
By Jason Hill
Threat Research |

February 3, 2022

Ransomware Year in Review 2021
Varonis Threat Labs
By Varonis Threat Labs
Threat Research |

February 2, 2022

Using Power Automate for Covert Data Exfiltration in Microsoft 365
Eric Saraga
By Eric Saraga
Threat Research |

January 26, 2022

BlackCat Ransomware (ALPHV)
Jason Hill
By Jason Hill
Threat Research |

January 18, 2022

Mixed Messages: Busting Box’s MFA Methods
Tal Peleg
By Tal Peleg
Threat Research |

December 2, 2021

Bypassing Box's Time-based One-Time Password MFA
Tal Peleg
By Tal Peleg
Prev 1 2 3 4 Next
  • English
  • Deutsch
  • Français
  • Русский
  • Legal
  • |
  • Trust
  • Legal
  • |
  • Trust
© 2022
Varonis