![RyanOBoyle_circle](https://info.varonis.com/hs-fs/hubfs/images/headshots/RyanOBoyle_circle.jpg?width=102&height=102&name=RyanOBoyle_circle.jpg)
Ryan O'Boyle
Engineer, Varonis
Our Clients
![Varonis Customers](http://info.varonis.com/hs-fs/hubfs/Varonis%20Landing/logo-white-left.png?t=1498677966558&width=600&height=66&name=logo-white-left.png)
![Varonis Customers](http://info.varonis.com/hs-fs/hubfs/Varonis%20Landing/logo-white-right.png?t=1498677966558&width=600&height=35&name=logo-white-right.png)
Demo | On-Demand | Video Replay
Our incident response team is seeing an uptick in adversaries using a very tricky man-in-the-middle attack to bypass MFA and breach Office 365 tenants.
Here’s an outline of how the attack works:
“Our biggest surprise to us as a company was to finally know how much sensitive data was actually out there living on our servers.”
Gomez, Senior IT Architect, The University of Southern California
© 2024 Varonis Systems, Inc