Inside Out Security
SolarWinds SUNBURST Backdoor: Inside the Stealthy APT Campaign
Imagine if everyone with an Amazon Echo in their home had to assume it’s been unlocking their doors and letting a thief inside for the past 6 months. How would you...
Read MoreExplore by topic:
Last Week in Microsoft Teams: Week of January 18th
The Microsoft Teams blog released several articles this week: Approvals in Microsoft Teams, Now General Available: The Approvals app enables Teams users to create, manage, and share approvals directly within...
Varonis Version 8.5: New Features to Combat Insider Risk in Microsoft 365
The transition to remote work over the last year has exponentially increased the usage of Microsoft 365’s collaboration tools. One look at the massive spike in daily active users for...
Threat Update 21 – SolarLeaks
The initial news of the SolarWinds supply chain attack was a devastating revelation to many organizations. It didn’t take the cybercriminal world long to try to profit off of this...
Exfiltrate NTLM Hashes with PowerShell Profiles
The privilege escalation method shown in this article is a variant used by Russian-based espionage groups. It outlines an attacker’s ability to leverage built-in PowerShell features to execute arbitrary commands...
Threat Update 20 – Cyberthreat 2021
Anyone else excited that 2020 is over? In the spirit of looking to the future, join Kilian Englert and Ryan O’Boyle from the Varonis Incident Response team as they discuss...
Last Week in Microsoft Teams: Week of January 11th
Microsoft published their monthly What’s New in Microsoft Teams for December 2020. The recap includes summaries of virtual breakout rooms, new meeting pre-join experience, new device capabilities, and multiple number...
Threat Update 19 – Best Incident Response Investigations of 2020
Want to look back on 2020? Nah, neither do we… but 2020 did have a whole host of cyberthreats that posed new challenges to IT and InfoSec teams! Click to...
What Is Network Segmentation?
Simply put, network segmentation is the act of dividing a computer network into smaller physical or logical components. Two devices on the same network segment can talk to each other...
Threat Update 18 – Sanctions for Ransomware Payments
Would you consider coughing up the bitcoins if you got hit with ransomware? Better think again, you could potentially end up in more trouble! Click to watch Kilian Englert and...
The Complete Guide to Phishing Attacks
Phishing attacks have been a plight on individuals and organizations since the invention of email. As of late, these attacks have become more sophisticated and challenging to detect. Phishing attacks...