Ed Lin

Latest articles

Identify and Investigate Business Email Compromise (BEC) Scams

Ed Lin

Ed Lin

In this post, we'll review how to spot Business Email Compromise Scams and walk you through an investigation with Varonis.

How to Investigate NTLM Brute Force Attacks

Ed Lin

Ed Lin

This post explains the process the Varonis IR team follows to investigate NTLM Brute Force attacks, which are common incidents reported by customers.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.