-
Data Security
Jun 27, 2017
🚨 Petya-Inspired Ransomware Outbreak: What You Need To Know
On the heels of last month’s massive WannaCry outbreak, a major ransomware incident is currently underway by a new variant (now) dubbed “NotPetya.” For most of the morning, researchers believed the ransomware to be a variant of Petya, but Kaspersky Labs and others are reporting that, though it has similarities, it’s actually #NotPetya. Regardless of its name, here’s what you should know.
Rob Sobers
4 min read
-
Data Security
Jun 26, 2017
What is UPnP and why is it Dangerous?
Remember the first large-scale Mirai attack late last year? That was the one directed at IP cameras and took advantage of router configurations settings that many consumers never bother changing. The main culprit, though, was Universal Plug and Play or UPnP, which is enabled as a default setting on zillions of routers worldwide.
Michael Buckbee
3 min read
-
Data Security
Jun 20, 2017
I Click Therefore I Exist: Disturbing Research On Phishing
Homo sapiens click on links in clunky, non-personalized phish mails. They just do. We’ve seen research suggesting a small percentage are simply wired to click during their online interactions. Until recently, the “why” behind most people’s clicking behaviors remained something of a mystery. We now have more of an answer to this question based on findings from German academics. Warning: IT security people will not find their conclusions very comforting.
Michael Buckbee
3 min read
-
Data Security
Jun 14, 2017
GDPR: Troy Hunt Explains it All in Video Course
You’re a high-level IT security person, who’s done the grunt work of keeping your company compliant with PCI DSS, ISO 27001, and a few other security abbreviations, and one day you’re in a meeting with the CEO, CSO, and CIO. When the subject of General Data Protection Regulation (GDPR) comes up, all the Cs agree that there are some difficulties, but everything will be worked out.
Michael Buckbee
2 min read
-
Data Security
Jun 12, 2017
[Infographic] From Bad Report Cards to Insider Data Theft
We’ve all read the news recently about employees and contractors selling internal customer data records or stealing corporate intellectual property. But insiders breaking bad have been with us as long as we’ve had computers and disgruntled humans who understand IT systems.
Michael Buckbee
1 min read
-
PowerShell
Jun 08, 2017
Disabling PowerShell and Other Malware Nuisances, Part III
This article is part of the series "Disabling PowerShell and Other Malware Nuisances". Check out the rest: Part I Part II Part III
Michael Buckbee
2 min read
-
Data Security
Jun 06, 2017
Reality Leah Winner and the Age of Insider Threats
Prosecutors allege that 25-year-old federal contractor Reality Leah Winner printed a top-secret NSA document detailing the ongoing investigation into Russian election hacking last November and mailed it to The Intercept. This raises a series of questions when it comes to protecting sensitive information from insider threats.
Rob Sobers
2 min read
-
Data Security
Jun 06, 2017
Data Breach Definition by State
In the data management and IT space there have been significant consideration and hand wringing about how the European Union’s General Data Protection Regulation (GDPR) will eventually impact US based businesses or how a future US Federal data breach disclosure law might affect IT operations. What often is the missed in the discussion is that there are significant per state data disclosure notification regulations currently in effect in the USA..
Michael Buckbee
10 min read
-
Data Security PowerShell
Jun 02, 2017
Disabling PowerShell and Other Malware Nuisances, Part II
This article is part of the series "Disabling PowerShell and Other Malware Nuisances". Check out the rest: Part I Part II Part III
Michael Buckbee
3 min read
-
Data Security
May 26, 2017
Disabling PowerShell and Other Malware Nuisances, Part I
This article is part of the series "Disabling PowerShell and Other Malware Nuisances". Check out the rest: Part I Part II Part III
Michael Buckbee
4 min read
-
Data Security
May 22, 2017
Is a ransomware attack a data breach?
Ransomware is a loss of control Most IT people equate exfiltration of data from their network as the point at which control is lost and a data breach has occurred. They think of it like “where are the bits” and if your user database is being passed around the internet via bittorrent and sold off for a .0001 BTC an account you clearly have lost control.
Michael Buckbee
1 min read
-
Data Security
May 20, 2017
EternalRocks leaves backdoor trojan for remote access to infected machines
What we know so far The WannaCry ransomware worm outbreak from last Friday week used just one of the leaked NSA exploit tools, ETERNALBLUE, which exploits vulnerabilities in the SMBv1 file sharing protocol.
Kieran Laffan
2 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital