Data Security
How to Use Netcat Commands: Examples and Cheat Sheets
Mar 25, 2021
Learn what the Netcat utility program is and the different types of commands it can support to help IT organizations manage their networks in a better way.
Addressing New Federal IT Work From Home Risks
Mar 24, 2021
This federal IT working from home guide will cover the risks involved and potential solutions.
Stack Memory: An Overview (Part 3)
Mar 23, 2021
An overview of stack memory, it’s architecture, and how it can be used to reverse-engineer malware using x64dbg.
How to Use Autoruns to Detect and Remove Malware on Windows
Mar 22, 2021
This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.
ReConnect - Ways Attackers Sidestep Your Endpoints
Mar 22, 2021
One of the age-old questions in cybersecurity is, “Are my endpoint controls enough?” Spoiler alert, unfortunately not! Kilian and Brian discuss scenarios we’ve seen where sophisticated attack groups deliberately leverage...
How APTs Use Reverse Proxies to Nmap Internal Networks
Mar 18, 2021
This Nmap reverse proxies guide will cover proxychains, mitigation, and detection.
How to Unpack Malware with x64dbg
Mar 17, 2021
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.
Detecting Honeypot Access With Varonis
Mar 10, 2021
Honeypots are traps that the Blue Team (defenders) plant to catch potentially bad actors trying to exploit a vulnerability, snoop for data, or escalate privileges. Since a honeypot is a decoy,...
How to Merge in Git: Remote and Local Git Repositories Tutorial
Mar 08, 2021
Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.
Attack lab: Spear Phishing with Google Drive Sharing
Mar 02, 2021
Follow along as we show you how scammers are spear phishing with Google Drive sharing to avoid traditonal SPAM filters in Gmail that catch their scams
Varonis Veterans Spotlight: Georgi Georgiev
Feb 25, 2021
Welcome to the Varonis Veteran Spotlight! The purpose of this spotlight is to show our gratitude and appreciation for our Varonis Veterans, as well as honor their military service and...
Your Primer to Third-Party Risk Management
Feb 22, 2021
Learn the basics, definitions and best practices of third-party risk management
Try Varonis free.
Deploys in minutes.