Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more

Threat Update 38 – The Darkside Strikes Back

Ransomware is the scourge of IT and security professionals, and the Darkside group is one of the most notorious players in this space.
Kilian Englert
1 min read
Last updated October 21, 2021

Ransomware is the scourge of IT and security professionals, and the Darkside group is one of the most notorious players in this space. Join Kilian and Kyle Roth from the Varonis Incident Response Team as they highlight what we know about how the Darkside group operates.

👉Read the full breakdown of our Darkside threat intelligence report. 

Varonis customers also get access to great educational content to help support them on their journey: https://www.varonis.com/how-to-videos/

To learn how else we can help, please visit us at: https://www.varonis.com/help/

What you should do now

Below are three ways we can help you begin your journey to reducing data risk at your company:

  1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
  2. Download our free report and learn the risks associated with SaaS data exposure.
  3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Reddit, or Facebook.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

threat-update-42-–-hidden-costs-of-a-breach
Threat Update 42 – Hidden Costs of a Breach
The American Accounting Association performed a study on how data breaches impact businesses beyond the immediate costs of recovery and brand damage.
threat-update-50-–-critical-salesforce-misconfiguration
Threat Update 50 – Critical Salesforce Misconfiguration
Salesforce is the lifeblood of many organizations. The amount of critical, and sensitive information stored within is astronomical – however, there are parts of the solution designed to be accessed by non-corporate users, such as the Community module.
threat-update-23---bypassing-endpoint-controls-using-office-macros
Threat Update 23 - Bypassing Endpoint Controls Using Office Macros
So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls! Don’t believe us? Check out this...
threat-update-#25---helloransomware:-a-look-at-the-cd-projekt-red-attack
Threat Update #25 - HelloRansomware: A Look at the CD Projekt Red Attack
Love hacking in Cyberpunk? So do we! What about in real life? Not so much! Join Kilian Englert and Ryan O’Boyle from the Varonis Incident Response team as they discuss...