-
Data Security
Jun 25, 2022
What is Traceroute? How It Works and How to Read Results
Every second, trillions of 1’s and 0’s zip through fiber-optic links, skip from continent to continent through undersea cables and wirelessly bring users all over the world the Internet we know and love. But have you ever wondered exactly how those bits of data move from one place to another? Traceroute, a tool you may already have, can provide some insights by tracing the path between your computer and a target destination. In this post, we’ll look at what traceroute is and how traceroute works, learn how to run traceroute on several different platforms, and how to read a traceroute output.
Robert Grimmick
10 min read
-
Ransomware
Jun 25, 2022
Ryuk Ransomware: Breakdown and Prevention Tips
Although Ryuk ransomware is named after a famous Japanese anime villain, the threat it presents to businesses and organizations is far from fiction. First appearing in 2018, Ryuk ransomware has been targeting any number of both public and private sector entities, most notably hospitals and healthcare facilities in recent years.
David Harrington
6 min read
-
Data Security
Jun 24, 2022
What is an Insider Threat? Definition and Examples
Images of an elite hacker commandeering an organization’s network from halfway across the globe might play out well in Hollywood, but for many CISOs, an insider threat ranks high on the list of things keeping them up at night.
Robert Grimmick
7 min read
-
Data Security
Jun 24, 2022
Evil Twin Attack: What it is, How to Detect & Prevent it
As Wi-Fi has become increasingly abundant across many private and public spaces, it has become a breeding ground for malicious hackers and bad actors. One of these attacks is known as the evil twin attack, which takes advantage of individuals looking to connect to Wi-Fi via their devices.
Josue Ledesma
5 min read
-
Threat Research
Jun 17, 2022
Anatomy of a LockBit Ransomware Attack
The Varonis Forensics Team recently investigated and remediated a ransomware event that resulted in large-scale encryption and exfiltration across multiple file servers. The threat actor obtained long-term persistence, escalated privileges to domain administrator, executed command and control of multiple hosts, achieved mass data exfiltration, and ultimately destroyed data. Initial indicators Overnight, the victim company received an alert that appeared to show ransomware propagating on multiple file shares. These events originated from a single user, and patterns detected within the events resembled those often generated by ransomware. In the early morning, the company took immediate action to disable the compromised domain Administrator account and engaged Varonis to assist in the incident response and recovery process. Using the Varonis platform, the forensics team immediately identified the ransomware strain as "LockBit" and determined the full scope of impact. The Varonis team also observed PSExec used to perform lateral movement and remote execution within the environment.
Joseph Avanzato
8 min read
-
Data Security
Jun 16, 2022
What is Cyber Espionage? Complete Guide with Protection Tips
Cyber espionage is the unauthorized use of computer networks and other resources to access or transfer secret, classified, or sensitive information. It’s seen as a growing problem for governments, corporations, and individuals. In this post, we’ll explore the ins and outs of cyber espionage, learn how cyberspies carry out their sophisticated operations and dive into some steps you can take to protect your secret data. What is cyber espionage? Which factors define a cyber espionage attack? What makes a CyberSpy? Who’s at risk for cyber espionage? Cyber espionage attacker tactics How to prevent cyber espionage Closing thoughts
Robert Grimmick
11 min read
-
Threat Research
Jun 16, 2022
Rogue Shortcuts: LNK'ing to Badness
Multiple recent campaigns suggest that rogue Windows shortcuts ― specifically LNK files — are back in style with threat actors.
Jason Hill
5 min read
-
Varonis Products
Jun 15, 2022
Varonis Adds Data Classification Support for Amazon S3
Nathan Coppinger
5 min read
-
Active Directory
Jun 15, 2022
Group Policy Objects (GPOs): How They Work & Configuration Steps
Group policy objects (GPOs) are extremely useful tools for system administrators. With a GPO, sysadmins can manage and configure applications, software operations, and user settings throughout an entire organization. Admins can use GPOs as an efficient, centralized way of helping a company’s entire IT stack and user base to operate more safely and efficiently.
David Harrington
6 min read
-
Data Security
Jun 15, 2022
Data Protection Guide: How To Secure Google Drive for Your Business
Google Drive has fast become one of the most used productivity and collaboration suites in the cloud. And as its popularity has risen—along with the amount of data stored on Google Drive servers—it increasingly becomes a target of hackers. Knowing how to secure Google Drive is critical to your organization’s cybersecurity posture if it’s a platform you rely on.
David Harrington
7 min read
-
Privacy & Compliance
Jun 07, 2022
What Is Data Governance? Framework and Best Practices
Data governance is a must in today's dynamic and ever-changing enterprise environment. Businesses today capture massive amounts of data from a variety of sources, and data governance helps organizations manage risk, maximize value, and reduce costs. In short, data governance is the practice of knowing where your data is, how it's being utilized, and whether or not it’s adequately protected. Good data governance ensures that data has integrity, is consistent, and is not being misused or mishandled.
David Harrington
9 min read
-
Privacy & Compliance
Jun 03, 2022
ISO 27001 Compliance Guide: Essential Tips and Insights
HIPAA, CMMC, PCI, ISO, NIST - the range of potential security frameworks and certifications an organization has to choose from these days is an acronym soup that can make even a compliance specialist’s head spin!
Robert Grimmick
9 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital