Latest articles
How APTs Use Reverse Proxies to Nmap Internal Networks
Mar 18, 2021
This Nmap reverse proxies guide will cover proxychains, mitigation, and detection.
Exfiltrate NTLM Hashes with PowerShell Profiles
Jan 15, 2021
Learn how to exfiltrate NTLM hashes using PowerShell, Mimikatz, Hashcat and other techniques through real code examples, gif walkthroughs and screenshots.
Try Varonis free.
Get a detailed data risk report based on your company’s data.
Deploys in minutes.
Deploys in minutes.