News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Data protection: find sensitive data in Microsoft 365, AWS or Google
B2B Cyber ​​Security ShortNews

In addition to sensitive data, the secrets in companies also include stored information on access data, API keys or passwords on drives or in the cloud at AWS, Microsoft 365 or Google. To track down and classify these "secrets" in the corporate environment, Varonis now offers Secrets Discovery. With increasing cloud usage and ever faster app development, secrets, i.e. confidential information such as API keys or passwords, can end up almost anywhere and reveal intellectual property, source code and critical infrastructure. Accordingly, open secrets are increasingly responsible for devastating data breaches. The new data classification possibilities from Varonis Systems, Inc. the specialists...

Read more

Varonis: Cloud Security for Amazon S3
B2B Cyber ​​Security ShortNews

Varonis strengthens cloud security with data classification for Amazon S3. New capabilities provide granular, scalable data classification for S3 buckets, helping organizations reduce exposure of sensitive data. Varonis Systems, Inc., (NASDAQ:VRNS), the specialist in data-centric cybersecurity, introduces new features to improve security and data transparency in Amazon Simple Storage Service (S3). Unfortunately, data breaches due to misconfigured, publicly visible S3 buckets are not uncommon. Amazon Web Services (AWS) permissions are complex, difficult to manage, and constantly changing. For companies with sensitive information in S3, Varonis now offers continuous, real-time protection with DatAdvantage Cloud...

Read more

Hive Ransomware: Attack Sequence 
Hive Ransomware: Attack Sequence

The course of a ransomware attack using Hive was investigated by the Varonis forensics team during a customer deployment. The attack and the actions of the cyber criminals were documented in this way. First discovered in June 2021, Hive is used as ransomware-as-a-service by cybercriminals to attack healthcare facilities, nonprofits, retailers, utilities, and other industries worldwide. Most commonly, they use common ransomware tactics, techniques, and procedures (TTPs) to compromise victims' devices. Among others, phishing emails with malicious attachments, stolen VPN credentials and vulnerabilities are used to intrude into the targeted systems….

Read more

GDPR compliance also protects against ransomware damage
B2B Cyber ​​Security ShortNews

What were those times back in 2018, when the entry into force of the GDPR caused the greatest possible excitement in business and IT. Well, a realization after 4 years with GDPR: GDPR compliance also protects against ransomware damage. In the meantime, tempers have calmed down significantly in this regard and we had to experience a pandemic and a war of aggression in Europe. To make a long story short: Those who were GDPR compliant from the start were better able to deal with these enormous crises because they have already given their most valuable assets, their data, the necessary attention and have everything necessary…

Read more

Fake Vanity URLs on Zoom and Google
B2B Cyber ​​Security ShortNews

URL spoofing enables targeted social engineering attacks. Varonis warns against fake vanity URLs on Zoom and Google. Varonis Threat Labs have discovered vulnerabilities in Zoom, Box and Google Docs that allow cybercriminals to easily forge invite URLs. As a result, phishing links appear trustworthy even for trained employees, which significantly increases the likelihood of a successful attack: If they click on the link of their supposed employer, customer or partner, they will be taken to a phishing page that looks authentic and where they can be found should reveal sensitive data such as passwords and personal information. Depending on the social engineering technique, this information appears to users...

Read more

The Dangerous Nine: A Brief Portrait of Malware
The Dangerous Nine: A Brief Portrait of Malware Programs

The idea of ​​any malware aimed at companies would go beyond the scope. Here, Varonis Threat Labs presents 9 important malware variants that have particularly targeted information in companies in recent years - mostly remote access trojans (RAT), information stealers or banking trojans. In addition to a clear trend towards highly individualized ransomware, the Varonis Threat Labs have also noticed an increasing spread of so-called "commodity malware" in the last year. This term refers to malware that is available for purchase or free download on a large scale, that is not tailored to individual victims...

Read more

What executives should know about ransomware attacks
What executives should know about ransomware attacks

Like most industries, cybercriminals have adapted and changed over the past two years as circumstances have changed. They have a wealth of evolving tools in their arsenal and are able to leverage many vectors to get to their destination: the valuable enterprise data. Varonis experts explain what every executive needs to know about modern ransomware attacks. This is how modern attackers have learned to launch even more disruptive ransomware campaigns. At the same time, they have become more efficient and adept at avoiding prosecution. How ransomware groups form after a…

Read more

The top three ransomware trends of 2021
The top three ransomware trends of 2021

2021 is likely to go down in cybersecurity history as the year of ransomware. The global list of prominent victims ranges from pipeline operators and entire districts to publishers and retail chains. The Varonis Threat Labs have identified three key trends that will also keep us busy in 2022. Because one thing is certain: we will also have to deal with ransomware this year, probably even more and with even more attacks than 2021. Ransomware-as-a-Service A clear shift towards the ransomware-as-a-service business model could be a-Service (RaaS) where groups recruit partners,…

Read more

Varonis: Improved Microsoft 365 protection for more effective ransomware detection 
Varonis: Improved Microsoft 365 protection for more effective ransomware detection

Varonis brings new capabilities to reduce data exposure to Microsoft 365. New version reduces Microsoft 365 explosion radius, enables more effective ransomware detection, and reduces collaboration risks. The new version 8.6 of the Varonis data security platform improves data security when using Microsoft 365 with clear tools for identifying at-risk files and folders with access rights that are too broad, new threat models for defending against ransomware and automatic labeling of sensitive files. New version of data security platform The Varonis data security platform puts data at the center of protection measures, thereby helping companies…

Read more

New ransomware group ALPHV – BlackCat
New ransomware group ALPHV - BlackCat Oiltanking

Gasoline supplier Oiltanking is a prominent victim of the new ransomware group ALPHV – BlackCat. Varonis Threat Labs: Targeted recruitment of partners through financially attractive offers with payouts of up to 90 percent of profits. Since the end of 2021, Varonis Threat Labs have observed increased activity by the ransomware group ALPHV (also known as BlackCat), which is actively recruiting new partners as a ransomware-as-a-service (RaaS) provider, including (former) members of other gangs such as REvil, Black Matter and Dark Side. The attack on the gas station supplier Oiltanking, which affected Shell among others, goes back to BlackCat. Other destinations include larger…

Read more