Hackers can check Varonis for vulnerabilities

B2B Cyber ​​Security ShortNews

Share post

This is also how you can do it to avoid a hacker attack that relies on vulnerabilities: Varonis has started a public program for reporting vulnerabilities on the HackerOne bug bounty platform.

The Varonis Vulnerability Disclosure Program (VDP) enables the entire HackerOne community to easily report potential security issues related to Varonis enterprise and cloud environments, including Varonis SaaS products.

Ethical hackers look for vulnerabilities

“Varonis has had great success with its own vulnerability reporting program, so the next logical step was to partner with HackerOne, the undisputed leader in vulnerability coordination and bug bounty management,” said Guy Shamilov, Varonis CISO. “Our goal has always been to provide the best possible security for our platforms. With our new SaaS offering, we continue our huge investments in product security. The VDP at HackerOne allows security researchers to report problems easily and securely. This will help to make our products even safer and thus protect our customers even better.”

Bug Bounty platform rewards hackers

"Varonis' decision to adopt a VDP is a major proactive step in hardening attack surfaces and is a sign of an increasingly sophisticated approach to security," said Amanda Berger, Chief Customer Officer at HackerOne. "The diverse hacking community has an unmatched ability to keep up with the ever-evolving threat landscape and identify the vulnerabilities that cybercriminals are most likely to exploit."

More at www.varonis.de

 


About Varonis

Since its founding in 2005, Varonis has taken a different approach than most IT security providers by placing company data stored both locally and in the cloud at the center of its security strategy: sensitive files and e-mails, confidential customer, patient and Employee data, financial data, strategy and product plans and other intellectual property. The Varonis data security platform (DSP) detects insider threats and cyber attacks through the analysis of data, account activities, telemetry and user behavior, prevents or limits data security breaches by locking sensitive, regulated and outdated data and maintains a secure state of the systems through efficient automation .,


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more

HeadCrab 2.0 discovered

The HeadCrab campaign against Redis servers, which has been active since 2021, continues to successfully infect targets with the new version. The criminals' mini-blog ➡ Read more