-
Threat Research
Feb 02, 2022
Using Power Automate for Covert Data Exfiltration in Microsoft 365
What is Power Automate? Power Automate, formerly known as Microsoft Flow, allows users to automate workflows between various apps and services. Using Power Automate, you can create "flows" in Microsoft 365 for Outlook, SharePoint, and OneDrive to automatically share or send files, forward emails, and much more.
Eric Saraga
5 min read
-
Threat Research
Jan 26, 2022
BlackCat Ransomware (ALPHV)
Following news that members of the infamous ‘big-game hunter’ ransomware group REvil have been arrested by Russian law enforcement, effectively dismantling the group and their operations, it is likely that the group’s affiliates will migrate to other ransomware-as-a-service (RaaS) providers.
Jason Hill
9 min read
-
Varonis Products
Jan 25, 2022
Varonis 8.6: Control Collaboration Chaos in Microsoft 365
Microsoft 365 makes it easier than ever to collaborate and share data internally and externally. But this increased sharing has created a complex web of permissions behind the scenes that makes protecting sensitive data very challenging.
Nathan Coppinger
6 min read
-
Ransomware
Jan 24, 2022
What Every CEO Should Know About Modern Ransomware Attacks
Like most businesses, cybercriminals have adapted and adjusted over the past two years. Modern attackers have learned to launch more destructive ransomware campaigns while becoming more efficient and adept at evading law enforcement. We now see ransomware gangs quickly rebrand themselves after a disruption, with new names and new infrastructure. DarkSide, the ransomware group behind several prominent attacks, seems to have rebranded as BlackMatter.
Yaki Faitelson
3 min read
-
Threat Research
Jan 18, 2022
Mixed Messages: Busting Box’s MFA Methods
Varonis Threat Labs discovered a way to bypass multi-factor authentication (MFA) for Box accounts that use an SMS code for login verification. Using this technique, an attacker could use stolen credentials to compromise an organization’s Box account and exfiltrate sensitive data without access to the victim’s phone. We disclosed this issue to Box on November 2, 2021 via HackerOne and Box released a fix. Sound familiar? This is the second Box MFA bypass we’ve discovered recently. You can read about our authenticator-based MFA bypass.
Tal Peleg
3 min read
-
Data Security
Dec 08, 2021
What is an APT?: Advanced Persistent Threat Overview
An advanced persistent threat or APT is an attacker that lurks within your environment for an extended period of time, drops malware and other malicious software in your environment, and exfiltrates valuable data.
Josue Ledesma
4 min read
-
Data Security
Dec 08, 2021
What is a Brute Force Attack? Definition
A brute force attack (also known as brute force cracking) is the cyberattack equivalent of trying every key on your key ring, and eventually finding the right one. 5% of confirmed data breach incidents in 2017 stemmed from brute force attacks.
Michael Buckbee
4 min read
-
Threat Research
Dec 02, 2021
Bypassing Box's Time-based One-Time Password MFA
The Varonis research team discovered a way to bypass multi-factor authentication for Box accounts that use authenticator apps such as Google Authenticator.
Tal Peleg
2 min read
-
Data Security
Dec 01, 2021
Defend Against Ransomware with the NIST Ransomware Profile
Ransomware attacks are on the rise and continue to be a disruptive force in the cybersecurity industry. The FBI's Internet Crime Complaint Center reported 2,084 ransomware complaints from January to July 31, 2021. This year alone represents a 62% year-over-year increase.
Yumna Moazzam
4 min read
-
Data Security
Nov 18, 2021
How to Monitor Network Traffic: Effective Steps & Tips
No matter how communications and information technology evolves, data in motion will always exist. Hackers will always target the main arteries and thoroughfares of data flow, so monitoring network traffic is crucial for organizations of all shapes and sizes. Monitoring network traffic helps maintain network performance and speed while also acting as a safeguard and early warning system for potential problems.
David Harrington
4 min read
-
Threat Research
Nov 17, 2021
No Time to REST: Check Your Jira Permissions for Leaks
Executive Summary Varonis researchers enumerated a list of 812 subdomains and found 689 accessible Jira instances. We found 3,774 public dashboards, 244 projects, and 75,629 issues containing email addresses, URLs, and IP addresses in those instances.
Omri Marom
4 min read
-
Data Security
Nov 17, 2021
What is Role-Based Access Control (RBAC)?
Organizations of all sizes are worried about securing their IT investments and a key part of this is providing users limited access only to the resources that they need to perform their work. This is known as the Principle of least privilege.
Neeraj Kumar
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital