-
Microsoft 365 Ransomware Threat Research
Jul 16, 2025
Take it Easy: How Attackers use AI and No-Code Tools with M365 for "Native Phishing"
A real-world look at how attackers use OneNote, OneDrive, and AI/no-code tools like Flazio for phishing, and practical steps to defend your organization today.
Tom Barnea
3 min read
-
Cloud Security Threat Research
Jul 16, 2025
Behind the Making of Operation Frostbyte: The First Snowflake GOAT
Complete Operation Frostbyte, an interactive mission created by Varonis Threat Labs to test the cybersecurity community’s Snowflake data security knowledge.
Lexi Croisdale
4 min read
-
Cloud Security Threat Research
Jul 09, 2025
Count(er) Strike – Data Inference Vulnerability in ServiceNow
Varonis Threat Labs discovered a high severity vulnerability in ServiceNow’s platform that can lead to significant data exposure and exfiltration.
Neta Armon
10 min read
-
Threat Research
Jun 26, 2025
Ongoing Campaign Abuses Microsoft 365’s Direct Send to Deliver Phishing Emails
Varonis Threat Labs uncovered a phishing campaign with M365's Direct Send feature that spoofs internal users without ever needing to compromise an account.
Tom Barnea
4 min read
-
Cloud Security Threat Research
Jun 19, 2025
Why Kerberoasting Still Matters for Security Teams
Sometimes the old ones are best... avoided. Explore Kerberoasting and how it remains a relevant attack method.
Simon Biggs
3 min read
-
Threat Research
Jun 18, 2025
The Jitter-Trap: How Randomness Betrays the Evasive
Discover how Varonis researchers detect stealthy beacon traffic by analyzing jitter patterns, turning evasion tactics into powerful behavioral detection signals.
Masha Garmiza
6 min read
-
Threat Research
May 30, 2025
Scattered Spider: What You Need to Know
Get details on a prominent threat group and defensive recommendations to keep your organization's sensitive data secure.
Joseph Avanzato
2 min read
-
Threat Research
May 30, 2025
Commvault Metallic 0-Day Breach: What Happened and What It Means
The Commvault Metallic breach highlights the importance of securing identities, vetting vendors, and enforcing strict access controls in the cloud.
Rob Sobers
2 min read
-
Threat Research
May 27, 2025
Breaking and Re-Entering: Anatomy of a Resilient M365 BEC Attack Leveraging Inbound Connectors
Varonis uncovered a BEC attack leveraging Microsoft 365 admin tools, revealing advanced attacker methodologies and exploitation of administrative privileges.
Paul Wang
4 min read
-
Azure Threat Research
May 06, 2025
Does AZNFS SUID your needs? A Path to Root Privilege Escalation on Azure AI and HPC Workloads Using an Azure Storage Utility
Discover how a critical bug in AZNFS-mount could let attackers escalate privileges — and why updating to version 2.0.11 is vital for securing Azure Storage.
Tal Peleg
3 min read
-
Threat Research
May 02, 2025
One Small Click for an Admin, One Giant Breach for the Organization
Cyber attackers are targeting IT admins using clever SEO tricks to disguise malicious payloads to push these threats to the top of search results.
Varonis Threat Labs
5 min read
-
Threat Research
Apr 22, 2025
Cookie-Bite: How Your Digital Crumbs Let Threat Actors Bypass MFA and Maintain Access to Cloud Environments
Silent and undetectable initial access is the cornerstone of a cyberattack. MFA is there to stop unauthorized access, but attackers are constantly evolving.
Oren Bahar
12 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital