Threat Update 44 – Ransomware Early Warning: DNS Recon
Join Kilian and Kyle Roth from the Varonis Incident Response team as they discuss what DNS is, how it works, and how attackers can “live off the land” to map out an organization’s network using a few command-line tools built into every OS.
Ransomware gangs use every trick in the book to find and steal data before encrypting it. After landing in a new organization, they need to map out the resources, identify additional machines they want to compromise, and try to figure out which systems are the “juicy targets” storing valuable data.
There are several tactics for this, but one of the easiest and most direct ways is to leverage a common function virtually everywhere: DNS.
Join Kilian and Kyle Roth from the Varonis Incident Response team as they discuss what DNS is, how it works, and how attackers can “live off the land” to map out an organization’s network using a few command-line tools built into every OS.
Share this blog post with someone you know who'd enjoy reading it. Share it with them via email,LinkedIn,Reddit, or Facebook.
Kilian EnglertKilian has a background in enterprise security engineering, as well as security solution selling. Kilian is a Certified Information Systems Security Professional (CISSP) and creates internal and public content on topics related to cybersecurity and technology best practices.
Try Varonis free.
Get a detailed data risk report based on your company’s data. Deploys in minutes.
Salesforce is the lifeblood of many organizations. The amount of critical, and sensitive information stored within is astronomical – however, there are parts of the solution designed to be accessed by non-corporate users, such as the Community module.
Threat Update 43 – Ransomware Early Warning: Brute Force
Kilian Englert
June 23, 2021
With the proliferation of more sophisticated, human-operated ransomware, attackers can live inside an organization for days, weeks, or months - finding and exfiltrating data before making their presence known by detonating ransomware.
What is Red Teaming? Methodology & Tools
David Harrington
June 29, 2022
Red teaming simulates real-world hacks on your organization’s data and networks and spotlight vulnerabilities that help organizations strengthen security.
Threat Update 34 – Isn't the Internet Supposed to be Bombproof?
Kilian Englert
April 15, 2021
Kilian & Ryan dissect what could happen if a major data center went down, and how organizations leveraging cloud technology or solutions can prepare for business continuity.