Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Threat Detection

Articles

Threat Update 37 – Is SSO the new (h)Active Directory?

As organizations continue moving to cloud services at a breakneck pace, the adoption of SSO solutions has been a safe and effective way for IT teams to enable and control...

Read More

ARP Poisoning: What it is & How to Prevent ARP Spoofing Attacks

ARP Poisoning is a type of cyberattack that abuses weaknesses in the widely used Address Resolution Protocol (ARP) to disrupt, redirect, or spy on network traffic. In this piece, we’ll...

Read More

What is C2? Command and Control Infrastructure Explained

A successful cyberattack is about more than just getting your foot into the door of an unsuspecting organization. To be of any real benefit, the attacker needs to maintain persistence...

Read More

Employee Data Theft Definition, Examples and Prevention Tips

Not all attacks come from external threats. With frightening frequency, insider threats and employee data theft have hit organizations, stealing data, important IP, and putting the organization at risk. There...

Read More

March 2021 Malware Trends Report

This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to...

Read More

Threat Update 31 – Now are the Zero Days of our Discontent

Have you ever wanted to get into a concert, or movie, but you couldn’t get a ticket? Probably not recently, but in this remote age, we’ve all experienced something similar...

Read More

Addressing New Federal IT Work From Home Risks

Over the past year, working from home has gone from a temporary necessity to the new normal for many industries. United States federal government and Department of Defense (DoD) workers...

Read More

Stack Memory: An Overview (Part 3)

Stack memory is a section in memory used by functions to store data such as local variables and parameters that will be used by the malware to perform its nefarious...

Read More

How to Use Autoruns to Detect and Remove Malware on Windows

Understanding how to use Autoruns means you may be able to detect if your home PC is infected with unwanted software. Note: This article is intended to illustrate how malware...

Read More

Watch: ReConnect – Ways Attackers Sidestep Your Endpoints

One of the age-old questions in cybersecurity is, “Are my endpoint controls enough?” Spoiler alert, unfortunately not! Kilian and Brian discuss scenarios we’ve seen where sophisticated attack groups deliberately leverage...

Read More
 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.