www.varonis.com Open in urlscan Pro
45.60.154.169  Public Scan

Submitted URL: https://www.varonis.com/blog/blackcat-ransomware'
Effective URL: https://www.varonis.com/blog
Submission: On December 09 via api from IN — Scanned from PL

Form analysis 1 forms found in the DOM

https://www.varonis.com/search-results/

<form data-hs-do-not-collect="true" action="https://www.varonis.com/search-results/" __bizdiag="304576137" __biza="WJ__">
  <input type="text" class="nav-search-input hs-search-field__input" name="term" autocomplete="off" aria-label="Search" placeholder="What can we help you find?" required="">
  <input type="hidden" name="language" value="en">
  <input type="hidden" name="type" value="SITE_PAGE">
  <input type="hidden" name="type" value="LANDING_PAGE">
  <input type="hidden" name="type" value="BLOG_POST">
  <input type="hidden" name="limit" value="10">
  <button class="nav-search-submit" aria-label="Search">
    <svg xmlns="http://www.w3.org/2000/svg" width="22" height="20" viewBox="0 0 22 20" fill="none">
      <g clip-path="url(#clip0_1860_4622)">
        <path d="M8.54155 16.2034C12.9315 16.2034 16.4903 12.7065 16.4903 8.39283C16.4903 4.07918 12.9315 0.582275 8.54155 0.582275C4.15156 0.582275 0.592773 4.07918 0.592773 8.39283C0.592773 12.7065 4.15156 16.2034 8.54155 16.2034Z" stroke="#010203"
          stroke-linecap="round" stroke-linejoin="round"></path>
        <path d="M14.5781 13.4627L20.7412 19.4177" stroke="#010203" stroke-linecap="round" stroke-linejoin="round"></path>
      </g>
    </svg>
  </button>
</form>

Text Content

This site uses cookies to provide you with a better browsing experience. To
learn more about the different cookies we're using, please see our privacy
policy.

AcceptDecline

Platform
The #1 Data Security Platform
Varonis is your all-in-one SaaS platform to automatically find critical data,
remediate exposure, and stop threats in the cloud and on-premises.

DSPM

Improve your data security posture automatically.

AI Security

Secure AI copilots and LLMs.

Data Discovery & Classification

Accurately discovery, classify, and label sensitive data.

Cloud DLP

Monitor cloud data activity and prevent exfiltration.

Policy Automation

Enforce least privilege, labels, and secure settings.

UEBA

Detect abnormal activity from APTs and insider threats.

MDDR

24x7x365 data detection & response with an SLA.

SSPM

Fix critical SaaS misconfigs and third-party app risk.

Compliance Management

Automate compliance regulations and frameworks.

Email Security

Lock down sensitive mailboxes and stop exfiltration.

Identity Security

Detect attacks on AD, Entra ID, and Okta.

Athena AI

AI SOC analyst and natural language search.

See it in action

Find out why thousands of customers rely on Varonis to deliver automated
outcomes.

Get a demo

Learn more

Platform Overview Azure Marketplace AWS Marketplace Salesforce AppExchange
Coverage

Protection Packages

Microsoft 365 & Entra ID

Advanced data protection for your Microsoft cloud.

Windows File Shares & NAS

Protect cloud, hybrid, and on-premises files shares.

SaaS

Protect mission-critical data in SaaS apps.

IaaS

Protect data in AWS, Azure, and Google Cloud.

Databases

Discover, classify, and protect any database.

Industry-Leading Coverage

Microsoft 365

Microsoft Copilot

Windows File Shares

Active Directory

Google Workspace

Google Cloud

Salesforce

Box

AWS

Azure

Snowflake

Databricks

See all coverage
Why Varonis

Case Studies

How the world’s top companies protect their data.

Cloud-native Architecture

The benefits of our cloud-native platform.

MDDR

We investigate alerts so you don’t have to.

Calculate your ROI

Forrester Total Economic Impact study.

Industry Recognition

Partners with the leader in data security.

A Leader in Data Security

"Varonis is a top choice for organizations prioritizing deep data visibility,
classification capabilities, and automated remediation for data access."

Read Report

Rated #1 by customers.

Varonis is rated #1 overall in three Gartner Peer Insights markets.

Read Reviews
Company

About Varonis

About Us

Careers

Investor Relations

Public Sector

Trust Center

Newsroom

Contact Us

Brand

Partners

Partner Program

Partner Locator

Partner Portal

Buy on Azure Marketplace

Buy on AWS Marketplace

Resources

Blog

Learn from cybersecurity experts.

Support

Get technical support.

State of Cybercrime

Video podcast covering the latest cyber news.

Speed Data

Quick conversations with security leaders.

Webinars

Educational CPE webinars.

Events

Meet the Varonis team in person.

Community

Product documentation, Q&A forums, knowledgebase, and more.

Login

Product training

On-demand training and how-to videos for the Varonis DSP.

Login

Varonis Threat Labs

Read all the latest research

Ghost Sites: Stealing Data From Deactivated Salesforce Communities

Defending Your Cloud Environment Against LAPSUS$ Style Threats

Abusing Misconfigured Salesforce Communities for Recon and Data Theft

Languages
 * English
 * Deutsch
 * Español
 * Français
 * Italiano
 * Português - Brasil
 * Русский

 * English
 * Deutsch
 * Español
 * Français
 * Italiano
 * Português - Brasil
 * Русский

Demo Demo


View by category
Data Security Threat Research Varonis Products DSPM AI Security Cloud Security
Ransomware Active Directory Privacy & Compliance
Featured
Introducing Varonis for Google Cloud
Ellen Wilson
November 20, 2024
Varonis’ support for Google Cloud brings a unified and automated data security
approach to major cloud providers.
Featured
What’s New in Varonis: November 2024
Nathan Coppinger
November 21, 2024
Discover Varonis' latest features, including Google Cloud support, Database
masking, AWS access graph, and more.
Featured
How Tampa General Hospital Deployed Copilot Safely With Varonis
Lexi Croisdale
October 17, 2024
Discover how Tampa General Hospital safely deployed Microsoft 365 Copilot to
tackle administrative tasks with Varonis.
Featured
Cloud Security Essentials: The Case for Automated DSPM
Nolan Necoechea
June 21, 2024
Data security posture management (DSPM) has emerged as a standard for securing
sensitive data in the cloud and other environments. However, without automation,
DSPM doesn’t stand a chance. Automation is crucial to overcoming the challenges
of securing data in the cloud.


TRY VARONIS FOR FREE.

Get a detailed risk report based on your company’s data. Deploys in minutes.
Start now


FEATURED COLLECTIONS


LATEST ARTICLES

See all articles
CISO Secrets: Building the Ultimate Security Plan for 2025
Megan Garza
December 5, 2024
Learn why threats to the cybersecurity space might not be as advanced as they
seem and gain strategic advice on developing your security plan.
Introducing Varonis for Databricks
Nolan Necoechea
December 3, 2024
Secure sensitive data in Databricks at scale with deep visibility, proactive
remediation, and active threat detection using Varonis, a unified Data Security
Platform.
Caught in the Net: Unmasking Advanced Phishing Tactics
Tom Barnea
November 26, 2024
Learn new, advanced phishing tactics being used by attackers and how your
organization can combat them.
What’s New in Varonis: November 2024
Nathan Coppinger
November 21, 2024
Discover Varonis' latest features, including Google Cloud support, Database
masking, AWS access graph, and more.

See all articles


DATA SECURITY

See all Data security
CISO Secrets: Building the Ultimate Security Plan for 2025
Megan Garza
December 5, 2024
Learn why threats to the cybersecurity space might not be as advanced as they
seem and gain strategic advice on developing your security plan.
Caught in the Net: Unmasking Advanced Phishing Tactics
Tom Barnea
November 26, 2024
Learn new, advanced phishing tactics being used by attackers and how your
organization can combat them.
38 Must-Know Healthcare Cybersecurity Stats
Megan Garza
November 19, 2024
Cybersecurity in the healthcare sector is crucial. Learn strategies to
strengthen your security posture with these insights.
Speed Data: The Cyclical Nature of Data With Shesh Kondi
Megan Garza
October 29, 2024
The Salesforce pro discusses how security has evolved and the surprising
characteristic unique to the cybersecurity field

See all Data Security


THREAT RESEARCH

See all Threat research
Caught in the Net: Unmasking Advanced Phishing Tactics
Tom Barnea
November 26, 2024
Learn new, advanced phishing tactics being used by attackers and how your
organization can combat them.
Varonis Discovers New Vulnerability in PostgreSQL PL/Perl
Varonis Threat Labs
November 14, 2024
Varonis discovered a vulnerability (CVE-2024-10979) in the Postgres trusted
language extension PL/Perl that allows setting arbitrary environment variables
in PostgreSQL session processes.
New Organizational Messages Feature in Microsoft 365 a Potential Risk
Shawn Hays
November 10, 2024
The new organizational messages feature for Microsoft 365 enhances how IT and
security teams communicate with users at scale, but also generates risks.
New CVEs in OpenPrinting CUPS Software
Varonis Threat Labs
September 26, 2024
A series of vulnerabilities in OpenPrinting CUPS Software indicates an attack
vector for RCE, one of the worst possible consequences for a vulnerability.

See all Threat Research


VARONIS PRODUCTS

See all Varonis products
Introducing Varonis for Databricks
Nolan Necoechea
December 3, 2024
Secure sensitive data in Databricks at scale with deep visibility, proactive
remediation, and active threat detection using Varonis, a unified Data Security
Platform.
What’s New in Varonis: November 2024
Nathan Coppinger
November 21, 2024
Discover Varonis' latest features, including Google Cloud support, Database
masking, AWS access graph, and more.
Introducing Varonis for Google Cloud
Ellen Wilson
November 20, 2024
Varonis’ support for Google Cloud brings a unified and automated data security
approach to major cloud providers.
Varonis Integrates With MongoDB for Unmatched Data Visibility
Nathan Coppinger
November 19, 2024
Discover and classify sensitive data stored in MongoDB with pinpoint accuracy to
properly identify and secure critical information.

See all Varonis Products
Featured Videos
Varonis addresses hundreds of use cases, making it the ultimate platform to stop
data breaches and ensure compliance.
State of Cybercrime: China's Silent Cyber Campaigns
Data-First Forum: The Path to CISO
The Varonis Data Security Platform



CLOUD SECURITY

See all Cloud security
Introducing Varonis for Google Cloud
Ellen Wilson
November 20, 2024
Varonis’ support for Google Cloud brings a unified and automated data security
approach to major cloud providers.
Varonis Extends Industry-Leading Cloud Data Security to Azure Databases
Nathan Coppinger
November 13, 2024
Discover and protect critical data stored in Azure databases with Varonis'
industry-leading cloud data security.
Breaks in the Cloud: Protecting Against Top LLM Risks
Megan Garza
September 30, 2024
Understand the risk of Large Language Models (LLMs) to your cloud security and
why it's important to be cautious when adopting new technologies.
AWS Misconfigurations Lead to Exposed Data
Varonis Threat Labs
August 22, 2024
Discover how a recent data extortion campaign exposed sensitive files in
thousands of AWS environments and what you can do to prevent it from happening
to you.

See all Cloud Security


RANSOMWARE

See all Ransomware
Speed Data: The Commoditization of Cybercrime With Matt Radolec
Megan Garza
June 21, 2023
Matt Radolec at Varonis discusses the future of cybersecurity, the rise of
ransomware-as-a-service (RaaS), and what security risks keep him up at night.
Four Must-Know Cyber Tips for Your Business
Yaki Faitelson
December 1, 2022
The real story behind today’s breaches is never about an isolated bad
decision—it’s about the many decisions made long before a sleepy network
administrator gets a call from an attacker.
Ryuk Ransomware: Breakdown and Prevention Tips
David Harrington
June 25, 2022
Ryuk ransomware targets large organizations and spreads with deadly speed. Learn
about the strain and how to prevent your company from becoming a victim.
Why Every Cybersecurity Leader Should ‘Assume Breach’
Yaki Faitelson
May 16, 2022
Any system, account or person at any time can be a potential attack vector. With
such a vast attack surface, you need to assume attackers will breach at least
one vector.

See all Ransomware


EXPLORE OUR RESOURCES

Report

The Great SaaS Data Exposure

Case Study

How Varonis Helped a US Casino and Hotel Stop a Cyberattack within 30 Minutes

Whitepaper

Fighting a Different Battle: Varonis' Unique Approach to Cybersecurity


Report

The Great SaaS Data Exposure

Case Study

How Varonis Helped a US Casino and Hotel Stop a Cyberattack within 30 Minutes

Whitepaper

Fighting a Different Battle: Varonis' Unique Approach to Cybersecurity


ACTIVE DIRECTORY

See all Active directory
New Organizational Messages Feature in Microsoft 365 a Potential Risk
Shawn Hays
November 10, 2024
The new organizational messages feature for Microsoft 365 enhances how IT and
security teams communicate with users at scale, but also generates risks.
Azure Managed Identities: Definition, Types, Benefits + Demonstration
Neeraj Kumar
October 6, 2022
Use this guide to learn about Azure managed identities: What they are, how many
types there are, and what benefits they offer, plus how they work.
Group Policy Objects (GPOs): How They Work & Configuration Steps
David Harrington
June 15, 2022
Group Policy Objects (GPOs) let system admins control and implement
cybersecurity measures from a single location. Learn about GPOs and how they
work here.
12 Group Policy Best Practices: Settings and Tips for Admins
Jeff Brown
April 4, 2022
Group Policy configures settings, behavior, and privileges for user and
computers. In this article, you’ll learn best practices when working with Group
Policy.

See all Active Directory


PRIVACY & COMPLIANCE

See all Privacy & compliance
Top 10 Cybersecurity Awareness Tips: How to Stay Safe and Proactive
Lexi Croisdale
October 7, 2024
With breaches on the rise, it’s crucial to make cybersecurity a priority. Follow
these preventative cybersecurity tips for stronger security practices.
What The New SEC Cyber Disclosure Guidelines Mean For Your Business
Yaki Faitelson
August 29, 2024
Discover the challenges the new SEC cybersecurity guidelines present for your
CISO and learn tips on how to handle them at your organization.
The EU AI Act: What it is and Why it’s Important
Nolan Necoechea
August 16, 2024
An overview of the world’s first comprehensive AI regulation, its compliance
requirements, and how to prevent penalties of up to €35 million ($38 million).
Speed Data: The Principles of GRC With Hannah DeWane
Megan Garza
January 4, 2024
Hannah DeWane at Varonis shares her day-to-day world of security audits and the
wonderful world of risk management.

See all Privacy & Compliance


TRY VARONIS FREE.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.
Get started View sample

Platform

Overview DSPM AI Security Data Discovery & Classification Cloud DLP Policy
Automation UEBA MDDR SSPM Compliance Management Email Security Identity Security
Athena AI Data Access Governance

Coverage

Microsoft 365 & Entra ID File Shares & NAS SaaS IaaS Databases View all coverage

Resources

Support Community Blog Webinars Events Varonis Threat Labs State of Cybercrime

Company

About Varonis Careers Investor Relations Public Sector Partner Program Newsroom
Contact Us Brand

 * English
 * Deutsch
 * Español
 * Français
 * Italiano
 * Português - Brasil
 * Русский

Trust Center | Privacy Policy
© 2024 Varonis
Click for sound





30:21









Click for sound



53:34









2:46
Click for sound





2:46