Michael Buckbee

Latest articles

Cryptolocker, lockouts and mass deletes, oh my!

Michael Buckbee

Michael Buckbee

DatAlert Analytics just got some new threat models. Our research laboratory is tracking new ransomware, finding vulnerabilities in common security practices, and setting up new threat models to keep your...

New Varonis eBook Helps IT Kickstart Their Pen Testing Program

Michael Buckbee

Michael Buckbee

Hackers are able to break into systems and move around easily without being detected. How is this possible with so much invested in firewalls, malware scanners, and other intrusion detection...

CEO Phishing: Hackers Target High-Value Data

Michael Buckbee

Michael Buckbee

Humans like to click on links. Some of us are better at resisting the urge, some worse. In any case, you’d also expect that people in the higher reaches of...

Ransomware Guide for Healthcare Providers

Michael Buckbee

Michael Buckbee

Table of Contents Ransomware strains that have been targeting hospitals Should your hospital pay? Reasons not to pay Would a ransomware infection be considered a breach, according to HIPAA? Are...

PwC Report Shows That Cybercrime Is a Top C-Level Concern

Michael Buckbee

Michael Buckbee

One metric that’s difficult to gauge when it comes to cybercrimes is the economic impact felt by companies. However, PwC took on this challenge and just released the results of...

Samas, Cerber, Surprise: Three New Ransomware Variants to Have On Your Radar

Michael Buckbee

Michael Buckbee

As of late, the weekly press coverage of ransomware has been building a kind of brand recognition that’s the envy of many legitimate IT vendors. Ransomware’s own success has made...

There’s Something About Frameworks: A Look at HITRUST’s CSF

Michael Buckbee

Michael Buckbee

Repeat after me: frameworks are not standards. They are instead often used as a guide to navigate through the underlying standards. There are lots of frameworks cropping up in the...

With KeRanger, Mac Users Are No Longer Immune to Ransomware Threats

Michael Buckbee

Michael Buckbee

Cybercriminals who previously targeted Windows operating systems with ransomware have expanded their customer base to include the Mac OS. Known as KeRanger, it’s the first ransomware variant detected that infects...

Penetration Testing Explained, Part VII: Exfiltration and Conclusions

Michael Buckbee

Michael Buckbee

In this series of posts, I covered ideas to get you started using basic testing software to find security vulnerabilities. There are more advanced tools, such as Metasploit, which lets...

DatAlert Analytics and the Varonis Behavior Research Laboratory

Michael Buckbee

Michael Buckbee

Last November, we introduced Varonis UBA threat models to automatically analyze behavior and detect insider threats throughout the lifecycle of a breach.  Our UBA threat models, which are major enhancements...

Entrepreneurial RATs: AlienSpy and TaaS (Trojans as a Service)

Michael Buckbee

Michael Buckbee

When I wrote about Remote Access Trojans (RATs), I thought they were like the mousetraps of the hacking world — it’s hard to improve on. RATs let hackers get a...

Lessons from the Malware Museum

Michael Buckbee

Michael Buckbee

If you haven’t already seen Mikko Hypponen’s collection of vintage malware at the Internet Archive, take the time for a brief tour. If you’re on a lunch hour, it’s also...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.