-
Data Security
Apr 24, 2020
COVID-19 Threat Update #5
The race to enable remote work sent IT and security teams into high gear — and often resulted in shortcuts that exposed organizations to incredible risk in the process. Hackers...
Kilian Englert
1 min read
-
Data Security Security Bulletins Threat Research
Apr 22, 2020
Azure Skeleton Key: Exploiting Pass-Through Auth to Steal Credentials
We created a proof-of-concept that manipulates the Azure authentication function to give us a ‘skeleton key’ password that will work for all users, and dump all real clear-text usernames and passwords into a file.
Eric Saraga
6 min read
-
Data Security
Apr 15, 2020
Hackers Take Aim at Home WiFi Networks
Millions of people are working remotely – and attackers are taking advantage. As more workers log into residential WiFi networks, cybercriminals have plenty of opportunities to launch attacks. Varonis security...
Rachel Hunt
1 min read
-
Data Security
Apr 06, 2020
What is PGP Encryption and How Does It Work?
PGP is an encryption method that provides security and privacy for online communications — we’ll look at how PGP encryption works and how you can use it
Michael Buckbee
9 min read
-
Data Security
Apr 06, 2020
COVID-19 THREAT UPDATE #4
Millions of remote workers are accessing cloud services and using VPNs to maintain business continuity. But attackers are pivoting to gain the upper hand. Click to watch Matt Radolec and...
Kilian Englert
1 min read
-
Data Security
Apr 01, 2020
What is Fileless Malware? PowerShell Exploited
Fileless malware uses PowerShell to steal valuable data and inject malicious code into your systems. In this guide, we’ll show you how to protect yourself.
Michael Buckbee
8 min read
-
Data Security
Apr 01, 2020
Top 5 Remote Work Security Threats
COVID-19 threw us all a curveball, and attackers are rushing to take advantage of the increased attack surface. Varonis can help protect your remote workforce and data now and in better times.
Michael Buckbee
5 min read
-
Data Security
Mar 31, 2020
COVID-19 Threat Update #3
If you’re reading this, there’s a good chance you’ve become one of the millions of employees forced to work from home during the coronavirus crises. Accessing your emails and files...
Kilian Englert
1 min read
-
Data Security
Mar 29, 2020
Windows BlueKeep Vulnerability: Deja Vu Again With RDP Security Weaknesses
It’s a familiar data security story: under-patched Windows software, hidden security vulnerabilities, and hackers who know how to exploit them. But if the patch involves Windows Remote Desk Protocol (RDP),...
Michael Buckbee
5 min read
-
Data Security
Mar 29, 2020
CryptoLocker: Everything You Need to Know
CryptoLocker is a type of malware that encrypts files, holding them for ransom. For this reason, CryptoLocker and its variants have come to be known as “ransomware.”
Michael Buckbee
5 min read
-
Data Security
Mar 29, 2020
3 Tips to Monitor and Secure Exchange Online
Even if you don’t have your sights on the highest office in the country, keeping a tight leash on your emails is now more important than ever. Email is commonly...
Michael Buckbee
1 min read
-
Data Security Security Bulletins
Mar 29, 2020
Announcing Varonis Edge – to the Perimeter and Beyond
Email, web, and brute force attacks are the primary ways that malware gets through your defenses. The Yahoo hacker’s favorite technique? VPN. The Sony hack? Phishing emails. Remote Access Trojans?...
Michael Buckbee
1 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital