-
Varonis ProductsFeb 23, 2022
Varonis adds SSPM functionality to DatAdvantage Cloud
SaaS misconfigurations can unintentionally expose valuable corporate data. The new Insights Dashboard from Varonis helps you find and fix these security gaps.
Avia Navickas
2 min read
-
Data SecurityFeb 10, 2022
Identify and Investigate Business Email Compromise (BEC) Scams
In this post, we'll review how to spot Business Email Compromise Scams and walk you through an investigation with Varonis.
Ed Lin
9 min read
-
Threat ResearchFeb 03, 2022
Ransomware Year in Review 2021
In this post, we dive into six ransomware trends that shaped 2021.
Varonis Threat Labs
10 min read
-
Threat ResearchFeb 02, 2022
Using Power Automate for Covert Data Exfiltration in Microsoft 365
How threat actors can use Microsoft Power Automate to automate data exfiltration, C2 communication, lateral movement, and evade DLP solutions.
Eric Saraga
5 min read
-
Threat ResearchJan 26, 2022
BlackCat Ransomware (ALPHV)
Varonis has observed the ALPHV (BlackCat) ransomware, actively recruiting new affiliates and targeting organizations across multiple sectors worldwide.
Jason Hill
9 min read
-
Varonis ProductsJan 25, 2022
Varonis 8.6: Control Collaboration Chaos in Microsoft 365
Varonis is excited to announce Varonis Data Security Platform 8.6, with enhanced data security for Microsoft 365 to help find and fix collaboration risks.
Nathan Coppinger
6 min read
-
RansomwareJan 24, 2022
What Every CEO Should Know About Modern Ransomware Attacks
How To Make Yourself A Tougher Cybersecurity Target
Yaki Faitelson
3 min read
-
Threat ResearchJan 18, 2022
Mixed Messages: Busting Box’s MFA Methods
Varonis Threat Labs discovered a way to bypass multi-factor authentication (MFA) for Box accounts that use an SMS code for login verification.
Tal Peleg
3 min read
-
Threat ResearchDec 02, 2021
Bypassing Box's Time-based One-Time Password MFA
The Varonis research team discovered a way to bypass Box's Time-based One-Time Password MFA for Box accounts that use authenticator applications.
Tal Peleg
2 min read
-
Data SecurityNov 18, 2021
How to Monitor Network Traffic: Effective Steps & Tips
In this article, you will learn how to monitor network traffic using different tools and methods.
David Harrington
4 min read
-
Threat ResearchNov 17, 2021
No Time to REST: Check Your Jira Permissions for Leaks
Varonis researchers enumerated a list of 812 subdomains and found 689 accessible Jira instances. We found 3,774 public dashboards, 244 projects, and 75,629 issues containing email addresses, URLs, and IP...
Omri Marom
4 min read
-
Data SecurityNov 17, 2021
What is Role-Based Access Control (RBAC)?
Role-Based Access Control (RBAC) is a security paradigm where users are granted access depending on their role in your organization. In this guide, we'll explain what RBAC is, and how to implement it.
Neeraj Kumar
6 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital