Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

Threat Update #11 - Attack Attribution

In cybersecurity, incident response is the big game and analysis is the postgame wrap-up. After the threat is contained, security investigators can dive into what they’ve found to look for...
Kilian Englert
1 min read
Last updated January 17, 2023

In cybersecurity, incident response is the big game and analysis is the postgame wrap-up. After the threat is contained, security investigators can dive into what they’ve found to look for clues that point to a specific nation state or group. And it’s not easy.

Click to watch Kilian Englert talk with Ryan O’Boyle from our Incident Response team discuss what happens after the dust settles and investigators work on uncovering who or what is behind an attack.

Do you need to shore up your security stack to defend against ransomware infections like Emotet, or concerned you may already be infected?

👋 Varonis can help. Please click here to contact us.

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

what-is-a-brute-force-attack?
What is a Brute Force Attack?
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one. The most basic brute force attack is a dictionary attack, where the attacker works through a dictionary of possible passwords and tries them all.
how-to-investigate-ntlm-brute-force-attacks
How to Investigate NTLM Brute Force Attacks
This post explains the process the Varonis IR team follows to investigate NTLM Brute Force attacks, which are common incidents reported by customers.
what-is-a-whaling-attack?
What is a Whaling Attack?
A whaling attack specifically targets senior management in an organization such as the CEO, CFO, or other executives, hoping to leverage their authority to gain access to sensitive data. Discover everything you need to know about this attack including tips for avoiding one with our guide.
what-is-a-brute-force-attack?-definition
What is a Brute Force Attack? Definition
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one.