-
Threat Research
Sep 18, 2024
How Varonis’ Data Risk Assessment Works
Explore how Varonis' free Data Risk Assessment works and what makes it the most-advanced DRA in the industry.
Varonis Threat Labs
2 min read
-
Data Security Threat Research
Jun 14, 2023
Longer title for testing purposes thank you (Clone)
Test Blog 1
Test Author 1
4 min read
-
Threat Research
Mar 31, 2023
Return of the Darkside: Analysis of a Large-Scale Data Theft Campaign (Clone)
Our team has recently led several high-profile investigations of attacks attributed to an up-and-coming cybercrime group, Darkside ransomware
Snir Ben Shimol
7 min read
-
Ransomware Threat Research Varonis Products
Mar 31, 2023
Inline Test Page
GDPR Patterns Preview We’re less than a year out from EU General Data Protection Regulation (GDPR) becoming law, and hearing that our customers are facing more pressure than ever to...
Test Author 1
1 min read
-
Threat Research
Mar 31, 2023
The Logging Dead: Two Event Log Vulnerabilities Haunting Windows (Clone)
You don’t have to use Internet Explorer for its legacy to have left you vulnerable to LogCrusher and OverLog, a pair of Windows vulnerabilities discovered by the Varonis Threat Labs team.
Dolev Taler
4 min read
-
Security Bulletins Threat Research
Mar 31, 2023
Varonis Uncovers Another New Strain of the Qbot Banking Malware (Clone)
Varonis has discovered and reverse engineered another new strain of Qbot, a sophisticated, well-known type of malware that collects sensitive data, such as browser cookies, digital certificate information, keystrokes, credentials, and session data from its victims to commit financial fraud.
Dolev Taler
2 min read
-
Threat Research
Mar 31, 2023
CrossTalk and Secret Agent: Two Attack Vectors on Okta's Identity Suite (Clone)
Varonis Threat Labs discovered and disclosed two attack vectors on Okta's identity suite: CrossTalk and Secret Agent.
Tal Peleg and Nitay Bachrach
7 min read
-
Threat Research
Mar 31, 2023
VMware ESXi in the Line of Ransomware Fire (Clone)
Servers running the popular virtualization hypervisor VMware ESXi have come under attack from at least one ransomware group over the past week, likely following scanning activity to identify hosts with Open Service Location Protocol (OpenSLP) vulnerabilities.
Jason Hill
10 min read
-
Threat Research
Mar 31, 2023
Neo4jection: Secrets, Data, and Cloud Exploits (Clone)
With the continuous rise of graph databases, especially Neo4j, we're seeing increased discussions among security researchers about issues found in those databases. However, given our experience with graph databases ― from designing complex and scalable solutions with graph databases to attacking them ― we've noticed a gap between public conversations and our security researchers' knowledge of those systems.
Nitay Bachrach
15 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital