Hackers can check Varonis for vulnerabilities

B2B Cyber ​​Security ShortNews

Share post

This is also how you can do it to avoid a hacker attack that relies on vulnerabilities: Varonis has started a public program for reporting vulnerabilities on the HackerOne bug bounty platform.

The Varonis Vulnerability Disclosure Program (VDP) enables the entire HackerOne community to easily report potential security issues related to Varonis enterprise and cloud environments, including Varonis SaaS products.

Ethical hackers look for vulnerabilities

“Varonis has had great success with its own vulnerability reporting program, so the next logical step was to partner with HackerOne, the undisputed leader in vulnerability coordination and bug bounty management,” said Guy Shamilov, Varonis CISO. “Our goal has always been to provide the best possible security for our platforms. With our new SaaS offering, we continue our huge investments in product security. The VDP at HackerOne allows security researchers to report problems easily and securely. This will help to make our products even safer and thus protect our customers even better.”

Bug Bounty platform rewards hackers

"Varonis' decision to adopt a VDP is a major proactive step in hardening attack surfaces and is a sign of an increasingly sophisticated approach to security," said Amanda Berger, Chief Customer Officer at HackerOne. "The diverse hacking community has an unmatched ability to keep up with the ever-evolving threat landscape and identify the vulnerabilities that cybercriminals are most likely to exploit."

More at www.varonis.de

 


About Varonis

Since its founding in 2005, Varonis has taken a different approach than most IT security providers by placing company data stored both locally and in the cloud at the center of its security strategy: sensitive files and e-mails, confidential customer, patient and Employee data, financial data, strategy and product plans and other intellectual property. The Varonis data security platform (DSP) detects insider threats and cyber attacks through the analysis of data, account activities, telemetry and user behavior, prevents or limits data security breaches by locking sensitive, regulated and outdated data and maintains a secure state of the systems through efficient automation .,


 

Matching articles on the topic

Companies spend 10 billion euros on cybersecurity

Germany is arming itself against cyber attacks and is investing more than ever in IT and cyber security. In the current year the ➡ Read more

Qakbot remains dangerous

Sophos X-Ops has discovered and analyzed a new variant of the Qakbot malware. These cases first appeared in mid-December and they ➡ Read more

I-Soon: China's state-run foreign hackers exposed 

Internally, it is certainly the biggest betrayal of China: an employee of the I-Soon company revealed data and services ➡ Read more

VexTrio: most malicious DNS threat actor identified

A DNS management and security provider has exposed and blocked VexTrio, a complex criminal affiliate program. This increases cybersecurity. ➡ Read more

A comeback from Lockbit is likely

It is fundamentally important for Lockbit to be visible again quickly. Victims are presumably less willing to pay as long as there are rumors ➡ Read more

LockBit is alive

A few days ago, international law enforcement authorities scored a decisive blow against Lockbit. According to a comment from Chester Wisniewski, Director, Global ➡ Read more

Cyber ​​danger Raspberry Robin

A leading provider of an AI-powered, cloud-delivered cybersecurity platform warns about Raspberry Robin. The malware was first released in the year ➡ Read more

New scam Deep Fake Boss

Unlike classic scams such as the email-based boss scam, the Deep Fake Boss method uses high-tech manipulation ➡ Read more