Blog

Data Security

Hackers Take Aim at Home WiFi Networks

Rachel Hunt

Rachel Hunt

Millions of people are working remotely – and attackers are taking advantage. As more workers log into residential WiFi networks, cybercriminals have plenty of opportunities to launch attacks. Varonis security...

What is PGP Encryption and How Does It Work?

Michael Buckbee

Michael Buckbee

PGP is an encryption method that provides security and privacy for online communications — we’ll look at how PGP encryption works and how you can use it

COVID-19 THREAT UPDATE #4

Kilian Englert

Kilian Englert

Millions of remote workers are accessing cloud services and using VPNs to maintain business continuity. But attackers are pivoting to gain the upper hand. Click to watch Matt Radolec and...

What is Fileless Malware? PowerShell Exploited

Michael Buckbee

Michael Buckbee

Fileless malware uses PowerShell to steal valuable data and inject malicious code into your systems. In this guide, we’ll show you how to protect yourself.

Top 5 Remote Work Security Threats

Michael Buckbee

Michael Buckbee

COVID-19 threw us all a curveball, and attackers are rushing to take advantage of the increased attack surface. Varonis can help protect your remote workforce and data now and in better times.

COVID-19 Threat Update #3

Kilian Englert

Kilian Englert

If you’re reading this, there’s a good chance you’ve become one of the millions of employees forced to work from home during the coronavirus crises. Accessing your emails and files...

Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses

Michael Buckbee

Michael Buckbee

It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP),...

CryptoLocker: Everything You Need to Know

Michael Buckbee

Michael Buckbee

CryptoLocker is a type of malware that encrypts files, holding them for ransom. For this reason, CryptoLocker and its variants have come to be known as “ransomware.”

3 Tips to Monitor and Secure Exchange Online

Michael Buckbee

Michael Buckbee

Even if you don’t have your sights on the highest office in the country, keeping a tight leash on your emails is now more important than ever. Email is commonly...

Announcing Varonis Edge – to the Perimeter and Beyond

Michael Buckbee

Michael Buckbee

Email, web, and brute force attacks are the primary ways that malware gets through your defenses.  The Yahoo hacker’s favorite technique? VPN. The Sony hack? Phishing emails.  Remote Access Trojans?...

How Varonis Levels Up Your Incident Response

Michael Buckbee

Michael Buckbee

Varonis arms your incident response team with expert playbooks on how to respond to common alerts, as well as a free IR service to help you when you need it most.

Kerberos Attack: Silver Ticket Edition

Michael Buckbee

Michael Buckbee

With a name like Silver Ticket, you might think it’s not as scary as its cousin the Golden Ticket – you’d be horribly mistaken. A Silver Ticket is just as nasty...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.