Blog

Data Security

How to Use Netcat Commands: Examples and Cheat Sheets

Michael Buckbee

Michael Buckbee

Learn what the Netcat utility program is and the different types of commands it can support to help IT organizations manage their networks in a better way.

Addressing New Federal IT Work From Home Risks

David Harrington

David Harrington

This federal IT working from home guide will cover the risks involved and potential solutions.

Stack Memory: An Overview (Part 3)

Neil Fox

Neil Fox

An overview of stack memory, it’s architecture, and how it can be used to reverse-engineer malware using x64dbg.

How to Use Autoruns to Detect and Remove Malware on Windows

Neil Fox

Neil Fox

This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.

ReConnect - Ways Attackers Sidestep Your Endpoints

Kilian Englert

Kilian Englert

One of the age-old questions in cybersecurity is, “Are my endpoint controls enough?” Spoiler alert, unfortunately not! Kilian and Brian discuss scenarios we’ve seen where sophisticated attack groups deliberately leverage...

How APTs Use Reverse Proxies to Nmap Internal Networks

Tokyoneon

Tokyoneon

This Nmap reverse proxies guide will cover proxychains, mitigation, and detection.

How to Unpack Malware with x64dbg

Neil Fox

Neil Fox

This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.

Detecting Honeypot Access With Varonis

Michael Buckbee

Michael Buckbee

Honeypots are traps that the Blue Team (defenders) plant to catch potentially bad actors trying to exploit a vulnerability, snoop for data, or escalate privileges. Since a honeypot is a decoy,...

How to Merge in Git: Remote and Local Git Repositories Tutorial

Jeff Brown

Jeff Brown

Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.

Attack lab: Spear Phishing with Google Drive Sharing

Nathan Coppinger

Nathan Coppinger

Follow along as we show you how scammers are spear phishing with Google Drive sharing to avoid traditonal SPAM filters in Gmail that catch their scams

Varonis Veterans Spotlight: Georgi Georgiev

Belinda Ng

Belinda Ng

Welcome to the Varonis Veteran Spotlight! The purpose of this spotlight is to show our gratitude and appreciation for our Varonis Veterans, as well as honor their military service and...

Your Primer to Third-Party Risk Management

Josue Ledesma

Josue Ledesma

Learn the basics, definitions and best practices of third-party risk management

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.