Organizations face threats from all sides – both external attackers trying to get in, and internal “trusted” employees going rogue.
It was only a matter of time before these two forces combined. The attackers and associates behind the LockBit 2.0 ransomware are skipping the old tried-and-true infiltration vectors like phishing emails, and simply offering cash for disgruntled insiders to provide credentials that will let attackers in through VPN, RDP, or to corporate email addresses.
Join Kilian and Kyle Roth from the Varonis Incident Response team as they break down some of the details on how LockBit works, provide suggestions on how to spot signs of rogue behavior, and ways organizations can reduce the “blast radius” of a compromised account.
Share this blog post with someone you know who'd enjoy reading it. Share it with them via email,LinkedIn,Reddit, or Facebook.
Kilian Englert
Kilian has a background in enterprise security engineering, as well as security solution selling. Kilian is a Certified Information Systems Security Professional (CISSP) and creates internal and public content on topics related to cybersecurity and technology best practices.
Try Varonis free.
Get a detailed data risk report based on your company’s data.
Speed Data: Why Cybersecurity is an Unceasing Progression With Siwar El Assad
Megan Garza
September 27, 2023
Siwar El Assad chats about the impact of cybersecurity on modern society, the reality of breaches, and how a chance encounter led Siwar to the industry.
DSPM Deep Dive: Debunking Data Security Myths
Kilian Englert
September 21, 2023
DSPM is the leading acronym in cybersecurity. However, the recent buzz has cluttered the meaning of data security posture management. Let's demystify it.
Speed Data: Rethinking Traditional Cybersecurity Principles With Rick Howard
Megan Garza
September 11, 2023
Rick Howard, author, journalist, and Senior Fellow at the CyberWire, chats about his new book on rebooting cybersecurity principles with Varonis' Megan Garza.
The Benefits of Threat and Data Breach Reports
Scott Shafer
September 8, 2023
Threat and data breach reports can help organizations manage security risks and develop mitigation strategies. Learn our three pillars of effective data protection and the benefits from these reports.