-
Data Security
Apr 01, 2021
March 2021 Malware Trends Report
This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.
Ben Zion Lavi
6 min read
-
Data Security Security Bulletins
Mar 29, 2021
The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees
Hospitals, biotech firms and pharma companies are entrusted to protect sensitive information—from personal patient data to valuable proprietary research–from skilled adversaries looking to grab sensitive data to steal, sell, or extort from victim organizations.
Rachel Hunt
1 min read
-
Active Directory Data Security
Mar 25, 2021
How to Use Azure Private Endpoints to Restrict Public Access to WebApps
As an Azure administrator or architect, you are sometimes asked the question: “How can we safely deploy internal business applications to Azure App Services?”
Neeraj Kumar
9 min read
-
Data Security
Mar 25, 2021
What is Data Integrity and How Can You Maintain it?
If your company’s data is altered or deleted, and you have no way of knowing how, when and by whom, it can have a major impact on data-driven business decisions. This is why data integrity is essential. To understand the importance of data integrity to a company’s bottom line, let us examine what it is, why it’s significant, and how to preserve it.
Michael Buckbee
4 min read
-
Data Security
Mar 25, 2021
What is Data Classification? Guidelines and Process
Imagine you’re the CISO of a 10,000-person organization where users create millions of files and emails each day. Some of that information is highly sensitive—if leaked or stolen, you’re facing a headline-making breach and seven-figure penalties. Most of the data created each day, however, could be published on the front page of the Times without incident.
Michael Buckbee
6 min read
-
Data Security
Mar 25, 2021
How to Use Netcat Commands: Examples and Cheat Sheets
The Netcat utility program supports a wide range of commands to manage networks and monitor the flow of traffic data between systems. Computer networks, including the world wide web, are built on the backbone of the Transmission Control Protocol (TCP) and User Datagram Protocol (UDP). Think of it as a free and easy companion tool to use alongside Wireshark, which specializes in the analysis of network packets. The original version of Netcat was released back in 1995 and has received a number of iterative updates in the decades since.
Michael Buckbee
7 min read
-
Data Security
Mar 24, 2021
Addressing New Federal IT Work From Home Risks
Over the past year, working from home has gone from a temporary necessity to the new normal for many industries. United States federal government and Department of Defense (DoD) workers are no exception. The only difference is the highly sensitive information that federal agency workers handle, making work from home data handling particularly risky.
David Harrington
5 min read
-
Data Security
Mar 23, 2021
Stack Memory: An Overview (Part 3)
Stack memory is a section in memory used by functions to store data such as local variables and parameters that will be used by the malware to perform its nefarious activity on a compromised device.
Neil Fox
9 min read
-
Data Security PowerShell Security Bulletins
Mar 22, 2021
How to Use Autoruns to Detect and Remove Malware on Windows
Understanding how to use Autoruns means you may be able to detect if your home PC is infected with unwanted software.
Neil Fox
6 min read
-
Data Security
Mar 22, 2021
ReConnect - Ways Attackers Sidestep Your Endpoints
One of the age-old questions in cybersecurity is, “Are my endpoint controls enough?” Spoiler alert, unfortunately not! Kilian and Brian discuss scenarios we’ve seen where sophisticated attack groups deliberately leverage attack vectors to bypass the endpoint, and answer the best questions during the event.
Kilian Englert
1 min read
-
PowerShell
Mar 19, 2021
PowerShell Variable Scope Guide: Using Scope in Scripts and Modules
PowerShell uses variables to store information that can be useful later on. Variables also make it easy to change values in multiple places by changing the variable’s definition. You can store information such as names, paths, and the results of commands in a variable.
Jeff Brown
5 min read
-
Threat Research
Mar 18, 2021
Return of the Darkside: Analysis of a Large-Scale Data Theft Campaign
Our team has recently led several high-profile investigations of attacks attributed to an up-and-coming cybercrime group, Darkside. These highly targeted campaigns were conducted in several phases over weeks or months, ultimately targeting theft and encryption of sensitive data, including backups. In this technical blog post, we will review the tactics, techniques, and procedures (TTPs) we’ve observed.
Snir Ben Shimol
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital