-
Threat Research
May 30, 2025
Scattered Spider: What You Need to Know
Get details on a prominent threat group and defensive recommendations to keep your organization's sensitive data secure.
Joseph Avanzato
2 min read
-
Threat Research
May 30, 2025
Commvault Metallic 0-Day Breach: What Happened and What It Means
The Commvault Metallic breach highlights the importance of securing identities, vetting vendors, and enforcing strict access controls in the cloud.
Rob Sobers
2 min read
-
Threat Research
May 27, 2025
Breaking and Re-Entering: Anatomy of a Resilient M365 BEC Attack Leveraging Inbound Connectors
Varonis uncovered a BEC attack leveraging Microsoft 365 admin tools, revealing advanced attacker methodologies and exploitation of administrative privileges.
Paul Wang
4 min read
-
Azure Threat Research
May 06, 2025
Does AZNFS SUID your needs? A Path to Root Privilege Escalation on Azure AI and HPC Workloads Using an Azure Storage Utility
Discover how a critical bug in AZNFS-mount could let attackers escalate privileges — and why updating to version 2.0.11 is vital for securing Azure Storage.
Tal Peleg
3 min read
-
Threat Research
May 02, 2025
One Small Click for an Admin, One Giant Breach for the Organization
Cyber attackers are targeting IT admins using clever SEO tricks to disguise malicious payloads to push these threats to the top of search results.
Varonis Threat Labs
5 min read
-
Threat Research
Apr 22, 2025
Cookie-Bite: How Your Digital Crumbs Let Threat Actors Bypass MFA and Maintain Access to Cloud Environments
Silent and undetectable initial access is the cornerstone of a cyberattack. MFA is there to stop unauthorized access, but attackers are constantly evolving.
Oren Bahar
12 min read
-
Azure Threat Research
Apr 15, 2025
Burning Data with Malicious Firewall Rules in Azure SQL Server
Exploiting a security gap in firewall rule-naming can suddenly delete entire servers and targeted assets when combined with admin actions.
Coby Abrams
4 min read
-
Cloud Security Threat Research
Apr 15, 2025
Avoid Getting Burned: Identifying and Correcting Common Misconfigurations in Azure Networking and Firewalls
Misconstruing the nuances of Azure Networking and Firewalls can result in security gaps and data exposure.
Coby Abrams
4 min read
-
Cloud Security Ransomware Threat Research
Apr 10, 2025
RansomHub – What You Need to Know About the Rapidly Emerging Threat
RansomHub, the notorious ransomware group, has affected over 200 victims in industries such as IT, healthcare, finance, and more.
Joseph Avanzato
4 min read
-
Cloud Security Data Security Ransomware Threat Research
Mar 12, 2025
Mind Games: How Social Engineering Tactics Have Evolved
Instead of using advanced tools or complex scripts, skilled threat actors infiltrate systems and steal data using the most effective weapon of all - words
Varonis Threat Labs
7 min read
-
Threat Research
Mar 05, 2025
Salt Typhoon: The Threat Group Behind Major Cyberattacks
Varonis Threat Labs profiles Salt Typhoon, an APT group that is responsible for a series of breaches targeting U.S. infrastructure and government agencies.
Joseph Avanzato
5 min read
-
Data Security Threat Research
Nov 26, 2024
Caught in the Net: Unmasking Advanced Phishing Tactics
Learn new, advanced phishing tactics being used by attackers and how your organization can combat them.
Tom Barnea
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital