Pen Testing Active Directory

You may have been following our series of posts on pen testing Active Directory environments and learned about the awesome powers of PowerView. No doubt you were wowed by our cliffhanger ending — spoiler alert — where we applied graph theory to find the derivative admin!

We know from the many emails we received that you demanded a better ‘long-form’ content experience. After all, who’d want to read about finding hackable vulnerabilities using Active Directory while being forced to click six-times to access the entire series?

Thanks to the miracle of PDF technology, we’ve compressed the entire series into an easy-to-ready, comfy ebook format. Best of all, you can scroll through the entire contents without having to touch messy hyperlinks.

Get The Ebook Now
Or check it all out online, here.
Data Security

My Big Fat Data Breach Cost Post, Part II

If I had to summarize the first post in this series in one sentence, it’s this: as a single number, the average is not the best way to understand a dataset. Breach cost averages are no exception! And when that dataset is skewed or “heavy tailed”, the average is even less meaningful. With this background, it’s easier to understand what’s going on with the breach cost controversy as its being played out in the business…
Data Security

[Podcast] How Weightless Data Impacts Data Security

By now, we’re all aware that many of the platforms and services we use collect and store information about our data usage. Afterall, they want to provide us with the most personalized experience. So when I read that an EU Tinder user requested information about her data and was sent 800 pages, I was very intrigued with the comment from Luke Stark, a digital technology sociologist at Dartmouth University, “Apps such as Tinder are taking…
Varonis News
Nasuni Cloud NAS

Varonis Brings Data Security to Nasuni

We’re excited to announce that, in an upcoming release, the Varonis Data Security Platform will bring data-centric audit and protection to Nasuni Enterprise File Services. Nasuni is a key Varonis partner in the growing market for hybrid cloud Network Attached Storage (NAS). If Nasuni is a critical part of your IT infrastructure, adding Varonis will enable you to: Discover and classify sensitive, regulated files Detect and alert on suspicious activity like ransomware and insider threats…
IT Pros

[Transcript] Ofer Shezaf and Keeping Ahead of the Hackers

Inside Out Security: Today I’m with Ofer Shezaf, who is Varonis’s Cyber Security Director. What does that title mean? Essentially, Ofer’s here to make sure that our products help customers get the best security possible for their systems. Ofer has had a long career in data security and I might add is a graduate of Israel’s amazing Technion University. Welcome, Ofer. Ofer Shezaf: Thank you. IOS: So I’d like to start off by asking you…
Varonis News

Catching Up With Varonis Tech Evangelist Brian Vecci

Who was that incredibly knowledgeable security pro on CNBC talking about the Equifax breach? That familiar face and voice  belongs to none other than our own Brian Vecci. If you’ve been following Varonis on Twitter or Linkedin, you’re likely aware that Brian has been on CNBC before. And he’s made a lot of other media appearance. So we asked our amazing research staff to track down Brian’s recent interview activity — not surprisingly, he’s been…
Data Security

[Podcast] Penetration Testers Sanjiv Kawa and Tom Porter

While some regard Infosec as compliance rather than security, veteran pentesters Sanjiv Kawa and Tom Porter believe otherwise. They have deep expertise working with large enterprise networks, exploit development, defensive analytics and I was lucky enough to speak with them about the fascinating world of pentesting. In our podcast interview, we learned what a pentesting engagement entails, assigning budget to risk, the importance of asset identification, and so much more. Regular speakers at Security Bsides,…
IT Pros

PowerShell Obfuscation: Stealth Through Confusion, Part II

Let’s step back a little from the last post’s exercise in jumbling PowerShell commands. Obfuscating code as a technique to avoid detection by malware and virus scanners (or prevent reverse engineering) is nothing really new. If we go back into the historical records, there’s this (written in Perl).  What’s the big deal, then? The key change is that hackers can go malware-free by using garden variety PowerShell in practically all phases of an attack. And…
Data Security

[Podcast] Varonis Director of Cyber Security Ofer Shezaf, Part II

A self-described all-around security guy, Ofer is in charge of security standards for Varonis products. In this second part of the interview, we explore different ways to improve corporate data security, including security by design techniques at the development stage, deploying Windows 10s, and even labeling security products! Learn more from Ofer by clicking on the interview above.
Data Security, IT Pros

3 Tips to Monitor and Secure Exchange Online

Even if you don’t have your sights on the highest office in the country, keeping a tight leash on your emails is now more important than ever. Email is commonly targeted by hackers as a method of entry into organizations. No matter if your email is hosted by a 3rd party or managed internally, it is imperative to monitor and secure those systems. Microsoft Exchange Online – part of Microsoft’s Office365 cloud offering – is…
IT Pros

PowerShell Obfuscation: Stealth Through Confusion, Part I

To get into the spirit of this post, you should probably skim through the first few slides of this presentation by Daniel Bohannon and Le Holmes given at Black Hat 2017. Who would have thunk that making PowerShell commands look unreadable would require a triple-digit slide deck? We know PowerShell is the go to-tool for post-exploitation, allowing attackers to live off the land and prosper. Check out our pen testing Active Directory series for more…
IT Pros

[Podcast] Varonis Director of Cyber Security Ofer Shezaf, Part I

A self-described all-around security guy, Ofer Shezaf is in charge of security standards for Varonis products. He has had a long career that includes most recently a stint at Hewlett-Packard, where he was a product manager for their SIEM software, known as ArcSight. Ofer is a graduate of Israel’s Technion University. It’s always great to talk to Ofer on data security since his perspective is shaped by a 20-year career. He’s seen it all! In…
Data Security

More NSA Goodness: Shadow Brokers Release UNITEDRAKE

Looking for some good data security news after the devastating Equifax breach? You won’t find it in this post, although this proposed federal breach notification law could count as a teeny ray of light. Anyway, you may recall the Shadow Brokers, which is the group that hacked the NSA servers, and published a vulnerability in Windows that made WannaCry ransomware so deadly. Those very same Shadow Brokers have a new product announcement that also appears…