-
Security Bulletins
Nov 02, 2020
October 2020 Malware Trends Report
This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.
Ben Zion Lavi
4 min read
-
Security Bulletins
Nov 02, 2020
October 2020 Malware Trends Report
This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.
Ben Zion Lavi
4 min read
-
Security Bulletins
Oct 26, 2020
Polyrize Acquisition
I’m excited to announce today our agreement to acquire Polyrize, a software company whose team and products are a natural fit as part of the Varonis family. This is the first company Varonis has acquired, and I want to give you some background on the strategic rationale for today’s announcement.
Yaki Faitelson
1 min read
-
Data Security
Oct 23, 2020
Watch: Varonis ReConnect!
Office 365 and Teams make sharing information and collaborating with distant colleagues a breeze. But if you’re not careful, you’ll open yourself up to considerable risk. That’s because securing your data on a need-to-know basis is easier said than done. You’ve got to check off a long list of questions, like who can (and who does) access your data, what they’re sharing, and how they’re sharing it. Miss these details and your sensitive data could end up…well, anywhere.
Rachel Hunt
1 min read
-
Security Bulletins
Oct 23, 2020
The Saga of Trickbot
Here is a little story that should have made the evening news. Well, it’s actually kind of a big geopolitical story, but given 2020’s logarithmic growth in geopolitical story significance, perhaps even this one is just a bit too tame for prime-time coverage. But we’ll tell the story anyway because it’s a good, big geopolitical story, and one that even saw Microsoft roll up its sleeves and jump in the mix.
Michael Buckbee
6 min read
-
Data Security
Oct 19, 2020
What is DNS Tunneling? A Detection Guide
DNS Tunneling turns DNS or Domain Name System into a hacking weapon. As we know, DNS is a giant White Pages or phone directory for the Internet. DNS also has a simple protocol to allow admins to query a DNS server’s database. So far, so good. Clever hackers realized that they could secretly communicate with a target computer by sneaking in commands and data into the DNS protocol. This idea is at the core of DNS Tunneling.
Michael Buckbee
4 min read
-
Data Security
Oct 07, 2020
How Varonis Helps Agencies Avoid the Pain and Penalties of Public Record Requests
Freedom of Information (FOI) requests are one of the ways that public organizations are held accountable by the media and the members of the community they serve. FOI laws require public organizations (i.e., government offices, public colleges, universities, and schools, for example) to release documents concerning a current issue or court case. FOIA.gov says, “The basic function of the Freedom of Information Act (FOIA) is to ensure informed citizens, vital to the functioning of a democratic society.”
Michael Buckbee
4 min read
-
Data Security PowerShell Security Bulletins
Sep 28, 2020
How Varonis Helps Stop Emotet
Our incident response team is tracking an unprecedented number of Emotet malware infections. The number of active concurrent Emotet investigations is threefold our previous high-water mark. This post will cover indicators of compromise, mitigations, and how Varonis can help you detect and stop Emotet at each phase of an attack.
Rob Sobers
6 min read
-
Data Security
Sep 28, 2020
Data Privacy Guide: Definitions, Explanations and Legislation
Data privacy or information privacy is a branch of data security concerned with the proper handling of data – consent, notice, and regulatory obligations. More specifically, practical data privacy concerns often revolve around:
Michael Buckbee
13 min read
-
Threat Research
Sep 25, 2020
Exploiting BGInfo to Infiltrate a Corporate Network
Executive Summary There is a remote code execution attack vector within BGInfo. A clever attacker can embed a path to a malicious script within a BGInfo config file (.bgi). If they can convince a user to click on the config file, it will load the malicious script from a remote location and run it in memory on the victim’s machine.
Dolev Taler
3 min read
-
Data Security
Sep 24, 2020
Data Migration Strategy Guide: Best Practices for Success and Security
If you are reading this, you are probably planning a data migration from on-premises data storage to a cloud-based platform or from one cloud platform to another. Data migration can be challenging in the best of times, and it’s crucial to have a secure data migration strategy and execution.
Rob Sobers
7 min read
-
Active Directory
Sep 21, 2020
How to Use John the Ripper: Tips and Tutorials
John the Ripper (JtR) is one of the hacking tools the Varonis IR Team used in the first Live Cyber Attack demo, and one of the most popular password cracking programs out there. In this blog post, we are going to dive into John the Ripper, show you how it works, and explain why it’s important.
Michael Buckbee
3 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital