-
Data Security
Nov 17, 2021
What is a Security Operations Center (SOC)?
With cyberattacks and data breaches on the rise, companies of all sizes need to place an emphasis on securing their technology assets. However, assembling a full-time in-house IT security team may not be feasible due to budget constraints and competing priorities.
David Harrington
8 min read
-
Data Security
Nov 16, 2021
INVEST in America Act: Billion-Dollar Funding for Cybersecurity
The INVEST in America Act provides nearly two billion dollars in funding to enhance the nation's cybersecurity.
Nathan Coppinger
3 min read
-
Data Security
Nov 05, 2021
Cloud Applications Put Your Data At Risk - Here's How To Regain Control
Cloud applications boost productivity and ease collaboration. But when it comes to keeping your organization safe from cyberattacks, they're also a big, growing risk.
Yaki Faitelson
3 min read
-
PowerShell
Nov 03, 2021
How to Install and Import Active Directory PowerShell Module
Are you tired of managing Active Directory using the graphical interface? Then you might be interested in the Active Directory PowerShell module! This module gives you the ability to manage Active Directory using commands in PowerShell. Harnessing the module opens up the possibilities of automating management tasks like user creation and removal.
Jeff Brown
5 min read
-
Threat Research
Nov 02, 2021
Einstein's Wormhole: Capturing Outlook & Google Calendars via Salesforce Guest User Bug
If your organization uses Salesforce Communities and Einstein Activity Capture, you might have unknowingly exposed your administrator's Outlook or Google calendar events to the internet due to a bug called Einstein's Wormhole discovered by the Varonis research team.
Nitay Bachrach
3 min read
-
Threat Research
Nov 02, 2021
BlackMatter Ransomware: In-Depth Analysis & Recommendations
Executive Summary CISA has issued a security bulletin regarding the BlackMatter 'big game hunter' ransomware group following a sharp increase in cases targeting U.S. businesses. To mitigate these attacks, it is recommended that organizations employ multifactor authentication (MFA) as well as updating vulnerable software and systems, such as those that are commonly exploited by ransomware groups.
Dvir Sason
6 min read
-
Data Security
Oct 29, 2021
Salesforce Security: 5 Ways Your Data Could be Exposed
Salesforce is the lifeblood of many organizations. One of its most valuable assets-the data inside-is also its most vulnerable. With countless permission and configuration possibilities, it's easy to leave valuable data exposed.
Avia Navickas
2 min read
-
Data Security
Oct 29, 2021
Update 62 - SaaS Authentication Monitoring Evasion
Businesses know they need to monitor their SaaS apps, but it's easy to get lulled into a false sense of security if you're relying on authentication monitoring as your only line of defense.
Kilian Englert
1 min read
-
Data Security
Oct 25, 2021
The MITRE ATT&CK Framework: A Comprehensive Guide
The MITRE ATT&CK framework is a global knowledge base hub for documenting various tactics and techniques that hackers use throughout the different stages of a cyberattack. The MITRE company began developing the database in 2013, and over the years it's become a key resource for cyber defense teams in assessing the vulnerabilities and security protocols.
David Harrington
7 min read
-
Data Security Threat Research
Oct 21, 2021
Abusing Misconfigured Salesforce Communities for Recon and Data Theft
Originally posted August 10, 2021. Executive Summary A misconfigured Salesforce Community may lead to sensitive Salesforce data being exposed to anyone on the internet. Anonymous users can query objects that contain sensitive information such as customer lists, support cases, and employee email addresses.
Nitay Bachrach
10 min read
-
Privacy & Compliance
Oct 20, 2021
Illinois Privacy Law Compliance: What You Need to Know
The state of Illinois has recently passed several key pieces of legislation designed to bolster the data privacy rights and protections of residents. Illinois privacy law seeks to achieve similar goals as international regulations like the EU's General Data Protection Regulation (GDPR) and US privacy laws such as the California Consumer Privacy Act (CCPA).
David Harrington
4 min read
-
Threat Research
Oct 19, 2021
Good for Evil: DeepBlueMagic Ransomware Group Abuses Legit Encryption Tools
A group known as "DeepBlueMagic" is suspected of launching a ransomware attack against Hillel Yaffe Medical Center in Israel, violating a loose "code of conduct" that many ransomware groups operate under.
Jason Hill
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital