Sponsored by Varonis
Categories
Cybercrime Goes SaaS: Renting Tools, Access, and Infrastructure
These days, the cybercrime ecosystem functions more and more like…
How a CPU spike led to uncovering a RansomHub ransomware attack
Varonis recently helped a customer who observed a spike in…
BiDi Swap: The bidirectional text trick that makes fake URLs look real
Varonis Threat Labs is shining a spotlight on a decade-old…
Meet Varonis Interceptor: AI-Native Email Security
Today, we are excited to announce Varonis Interceptor, AI-native email…
The Rise of Native Phishing: Microsoft 365 Apps Abused in Attacks
Attackers don’t need exploits; they need TRUST.    Changes in attack methods…
How attackers abuse S3 Bucket Namesquatting — And How to Stop Them
With the sheer amount of data and users leveraging AWS,…
Inside the incident: Uncovering an advanced phishing attack
This article is written by Varonis Security Specialist Tom Barnea.…