Data Security
EternalRocks leaves backdoor trojan for remote access to infected machines
May 20, 2017
What we know so far The WannaCry ransomware worm outbreak from last Friday week used just one of the leaked NSA exploit tools, ETERNALBLUE, which exploits vulnerabilities in the SMBv1...
Adylkuzz: How WannaCry Ransomware Attack Alerted The World To Even Worse Threats
May 17, 2017
Your garden variety ransomware, like Cerber, is the canary in the coal mine that rudely, but thankfully announces bigger security issues: insider threats and cyberattacks that take advantage of too...
Why did last Friday's ransomware infection spread globally so fast?
May 15, 2017
Ransomware is a type of malware that encrypts your data and asks for you to pay a ransom to restore access to your files. Cyber criminals usually request that the...
🚨 Massive Ransomware Outbreak: What You Need To Know
May 12, 2017
Remember those NSA exploits that got leaked a few months back? A new variant of ransomware using those exploits is spreading quickly across the world – affecting everyone from the...
Planet Ransomware
May 12, 2017
If you were expecting a quiet Friday in terms of cyberattacks, this ain’t it. There are reports of a massive ransomware attack affecting computers on a global scale: in the...
What is a Data Security Portfolio?
Apr 12, 2017
A Data Security Platform (DSP) is a category of security products that replaces traditionally disparate security tools to reduce risk and prevent threats.
Varonis Data Security Platform Listed in Gartner 2017 Market Guide for Data-Centric Audit and Protection
Apr 11, 2017
In 2005, our founders had a vision to build a solution focused on protecting the data organizations have the most of and yet know the least about – files and...
Practical PowerShell for IT Security, Part III: Classification on a Budget
Apr 05, 2017
Last time, with a few lines of PowerShell code, I launched an entire new software category, File Access Analytics (FAA). My 15-minutes of fame is almost over, but I was...
Practical PowerShell for IT Security, Part I: File Event Monitoring
Mar 08, 2017
Back when I was writing the ultimate penetration testing series to help humankind deal with hackers, I came across some interesting PowerShell cmdlets and techniques. I made the remarkable discovery...
Cloudbleed - Cloudflare Unauthorized Data Leak
Feb 24, 2017
Cloudflare is a huge internet infrastructure company (5.5 million websites), which means that you likely use them every day that you’re online, without ever realizing it. Depending on what metric...
Connecting Your Data Strategy to Analytics: Eight Questions to Ask
Jan 20, 2017
Big data has ushered in a new executive role over the past few years. The chief data officer or CDO now joins the C-level club, tasked with leveraging data science...
How to setup a SPF record to prevent spam and spear phishing
Jan 12, 2017
Some things go together like peanut butter and jelly: delicious, delightful and a good alternative to my dad’s “Thai-Italian Fusion” dinner experiments as a kid. When other things are combined...
Try Varonis free.
Deploys in minutes.