-
Data Security
Mar 21, 2022
How to Use Ghidra to Reverse Engineer Malware
An overview of the malware analysis tool Ghidra. This article covers how to install and navigate the Ghidra interface.
Neil Fox
7 min read
-
Data Security
Mar 18, 2022
What Is a Botnet? Definition and Prevention
Learn why botnets can be so dangerous and what your organization can do to protect your IoT devices and network.
Josue Ledesma
4 min read
-
Threat Research
Mar 11, 2022
Is this SID taken? Varonis Threat Labs Discovers Synthetic SID Injection Attack
A technique where threat actors with existing high privileges can inject synthetic SIDs into an ACL creating backdoors and hidden permission grants.
Eric Saraga
3 min read
-
Threat Research
Mar 04, 2022
ContiLeaks: Ransomware Gang Suffers Data Breach
Conti, a prolific ransomware group, has suffered a leak of both internal chat transcripts and source code being shared by a reported Ukrainian member
Jason Hill
5 min read
-
Ransomware
Feb 25, 2022
Ransomware-as-a-Service Explained: What is RaaS?
Ransomware as a service (RaaS) is an emerging and potent cybersecurity threat to all organizations. If you’re unaware of how RaaS works, your system is potentially at risk. What RaaS is and how to guard against it.
David Harrington
4 min read
-
Data Security
Feb 25, 2022
Common Types of Malware
This piece covers the various types of malware that are available and their characteristics.
Neil Fox
7 min read
-
Varonis Products
Feb 23, 2022
Varonis adds SSPM functionality to DatAdvantage Cloud
SaaS misconfigurations can unintentionally expose valuable corporate data. The new Insights Dashboard from Varonis helps you find and fix these security gaps.
Avia Navickas
2 min read
-
Data Security
Feb 10, 2022
Identify and Investigate Business Email Compromise (BEC) Scams
In this post, we'll review how to spot Business Email Compromise Scams and walk you through an investigation with Varonis.
Ed Lin
9 min read
-
Threat Research
Feb 03, 2022
Ransomware Year in Review 2021
In this post, we dive into six ransomware trends that shaped 2021.
Varonis Threat Labs
10 min read
-
Threat Research
Feb 02, 2022
Using Power Automate for Covert Data Exfiltration in Microsoft 365
How threat actors can use Microsoft Power Automate to automate data exfiltration, C2 communication, lateral movement, and evade DLP solutions.
Eric Saraga
5 min read
-
Threat Research
Jan 26, 2022
BlackCat Ransomware (ALPHV)
Varonis has observed the ALPHV (BlackCat) ransomware, actively recruiting new affiliates and targeting organizations across multiple sectors worldwide.
Jason Hill
9 min read
-
Varonis Products
Jan 25, 2022
Varonis 8.6: Control Collaboration Chaos in Microsoft 365
Varonis is excited to announce Varonis Data Security Platform 8.6, with enhanced data security for Microsoft 365 to help find and fix collaboration risks.
Nathan Coppinger
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital