-
Threat Research
May 30, 2025
Scattered Spider: What You Need to Know
Get details on a prominent threat group and defensive recommendations to keep your organization's sensitive data secure.
Joseph Avanzato
2 min read
-
Threat Research
May 30, 2025
Commvault Metallic 0-Day Breach: What Happened and What It Means
The Commvault Metallic breach highlights the importance of securing identities, vetting vendors, and enforcing strict access controls in the cloud.
Rob Sobers
2 min read
-
Threat Research
May 27, 2025
Breaking and Re-Entering: Anatomy of a Resilient M365 BEC Attack Leveraging Inbound Connectors
Varonis uncovered a BEC attack leveraging Microsoft 365 admin tools, revealing advanced attacker methodologies and exploitation of administrative privileges.
Paul Wang
4 min read
-
Azure Threat Research
May 06, 2025
Does AZNFS SUID your needs? A Path to Root Privilege Escalation on Azure AI and HPC Workloads Using an Azure Storage Utility
Discover how a critical bug in AZNFS-mount could let attackers escalate privileges — and why updating to version 2.0.11 is vital for securing Azure Storage.
Tal Peleg
3 min read
-
Threat Research
May 02, 2025
One Small Click for an Admin, One Giant Breach for the Organization
Cyber attackers are targeting IT admins using clever SEO tricks to disguise malicious payloads to push these threats to the top of search results.
Varonis Threat Labs
5 min read
-
Microsoft 365 Threat Research
Apr 24, 2025
SessionShark Steals Session Tokens to Slip Past Office 365 MFA
Discover how phishing kits like SessionShark threaten MFA security and learn how Varonis AI-driven solutions proactively defend against advanced phishing attacks.
Daniel Kelley
4 min read
-
Threat Research
Apr 22, 2025
Cookie-Bite: How Your Digital Crumbs Let Threat Actors Bypass MFA and Maintain Access to Cloud Environments
Silent and undetectable initial access is the cornerstone of a cyberattack. MFA is there to stop unauthorized access, but attackers are constantly evolving.
Oren Bahar
12 min read
-
Azure Threat Research
Apr 15, 2025
Burning Data with Malicious Firewall Rules in Azure SQL Server
Exploiting a security gap in firewall rule-naming can suddenly delete entire servers and targeted assets when combined with admin actions.
Coby Abrams
4 min read
-
Cloud Security Threat Research
Apr 15, 2025
Avoid Getting Burned: Identifying and Correcting Common Misconfigurations in Azure Networking and Firewalls
Misconstruing the nuances of Azure Networking and Firewalls can result in security gaps and data exposure.
Coby Abrams
4 min read
-
Cloud Security Ransomware Threat Research
Apr 10, 2025
RansomHub – What You Need to Know About the Rapidly Emerging Threat
RansomHub, the notorious ransomware group, has affected over 200 victims in industries such as IT, healthcare, finance, and more.
Joseph Avanzato
4 min read
-
AI Security Threat Research
Apr 07, 2025
Xanthorox AI — The Next Generation of Malicious AI Threats Emerges
Xanthorox AI is a modular, self-hosted Black-Hat AI tool for cybercrime. Varonis counters it with real-time detection of AI-driven email threats.
Daniel Kelley
3 min read
-
Cloud Security Data Security Ransomware Threat Research
Mar 12, 2025
Mind Games: How Social Engineering Tactics Have Evolved
Instead of using advanced tools or complex scripts, skilled threat actors infiltrate systems and steal data using the most effective weapon of all — words.
Varonis Threat Labs
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital