-
Privacy & Compliance
Jan 29, 2021
Risk Management Framework (RMF): An Overview
The Risk Management Framework (RMF) is a set of criteria that dictate how the United States government IT systems must be architected, secured, and monitored.
Michael Buckbee
6 min read
-
Data Security
Jan 29, 2021
What is DNS, How it Works + Vulnerabilities
The Domain Name System (DNS) is the internet’s version of the Yellow Pages. Back in the olden times, when you needed to find a business’ address, you looked it up in the Yellow Pages. DNS is just like that, except you don’t actually have to look anything up: your internet connected computer does that for you. It’s how your computer knows how to find Google, or ESPN.com, or Varonis.com.
Michael Buckbee
9 min read
-
Data Security
Jan 29, 2021
Hacking Wi-Fi With the ESP8266
The ESP8266 microcontroller is a cheap, powerful IoT module with embedded Wi-Fi, which can be programmed in a number of popular languages. On the Security Tools podcast, we explore some of Stefan Kremser’s popular Wi-Fi hacking tools based on the ESP8266.
Kody Kinzie
4 min read
-
Active Directory Data Security PowerShell
Jan 29, 2021
Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks
Windows Management Instrumentation (WMI) is a subsystem of PowerShell that gives admins access to powerful system monitoring tools. Though this system has been designed to allow for fast, efficient system administration, it also has a spookier side: it can be abused by insiders as a tool to surveil other employees. This can be extremely useful in detecting and defeating insider threats.
Michael Buckbee
13 min read
-
Data Security
Jan 29, 2021
What Is Cryptojacking? Prevention and Detection Tips
We live in a digital age, with more people than ever doing most, if not all, their financial transactions and shopping online. With this also came the rise in cryptocurrencies.
Rob Sobers
8 min read
-
Data Security
Jan 28, 2021
IPv6 Security Guide: Do you Have a Blindspot?
IPv6, the most recent iteration of the ubiquitous Internet Protocol, promises to solve a forthcoming shortfall of available IP addresses. But the latest generation of IP will also have profound impacts on network security. IPv4 and IPv6 will co-exist for years to come, but the sooner we start thinking about IPv6 security the better.
Robert Grimmick
7 min read
-
Data Security PowerShell Security Bulletins
Jan 27, 2021
11 Best Malware Analysis Tools and Their Features
Malware has become a huge threat to organizations across the globe. Something as simple as opening an email attachment can end up costing a company millions of dollars if the appropriate controls are not in place. Thankfully, there are a plethora of malware analysis tools to help curb these cyber threats.
Neil Fox
7 min read
-
Data Security Security Bulletins
Jan 27, 2021
Watch: Varonis ReConnect! Empowering Data Owners to Keep Risk Low
How do you get the right people access to the data they need faster, and still free up IT to focus on other mission-critical work?
Kilian Englert
1 min read
-
Data Security Security Bulletins
Jan 27, 2021
What is x64dbg + How to Use It
x64dbg is an open-source debugger for Windows that is a popular malware analysis tool. A debugger is used to step through code as it executes, so you can see exactly what it’s doing. Debuggers are essential for troubleshooting bugs, but they’re also used to reverse engineer malware.
Neil Fox
5 min read
-
Data Security
Jan 27, 2021
How Hackers Spoof DNS Requests With DNS Cache Poisoning
Domain Name Server (DNS) Spoofing is a cyber attack that tricks your computer into thinking it’s going to the correct website, but it’s not. Attackers use DNS cache poisoning to hijack internet traffic and steal user credentials or personal data.
Michael Raymond
9 min read
-
Data Security
Jan 19, 2021
Varonis Version 8.5: New Features to Combat Insider Risk in Microsoft 365
The transition to remote work over the last year has exponentially increased the usage of Microsoft 365’s collaboration tools. One look at the massive spike in daily active users for Teams tells the story:
Nathan Coppinger
4 min read
-
Data Security
Jan 15, 2021
Exfiltrate NTLM Hashes with PowerShell Profiles
The privilege escalation method shown in this article is a variant used by Russian-based espionage groups. It outlines an attacker’s ability to leverage built-in PowerShell features to execute arbitrary commands in an elevated (Administrator) context. Below is a demonstration on exfiltrating NTLM hashes.
Tokyoneon
10 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, CISO, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital