Blog

Data Security

Addressing New Federal IT Work From Home Risks

David Harrington

David Harrington

This federal IT working from home guide will cover the risks involved and potential solutions.

Stack Memory: An Overview (Part 3)

Neil Fox

Neil Fox

An overview of stack memory, it’s architecture, and how it can be used to reverse-engineer malware using x64dbg.

How to Use Autoruns to Detect and Remove Malware on Windows

Neil Fox

Neil Fox

This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.

ReConnect - Ways Attackers Sidestep Your Endpoints

Kilian Englert

Kilian Englert

One of the age-old questions in cybersecurity is, “Are my endpoint controls enough?” Spoiler alert, unfortunately not! Kilian and Brian discuss scenarios we’ve seen where sophisticated attack groups deliberately leverage...

How APTs Use Reverse Proxies to Nmap Internal Networks

Tokyoneon

Tokyoneon

This Nmap reverse proxies guide will cover proxychains, mitigation, and detection.

How to Unpack Malware with x64dbg

Neil Fox

Neil Fox

This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.

Detecting Honeypot Access With Varonis

Michael Buckbee

Michael Buckbee

Honeypots are traps that the Blue Team (defenders) plant to catch potentially bad actors trying to exploit a vulnerability, snoop for data, or escalate privileges. Since a honeypot is a decoy,...

How to Merge in Git: Remote and Local Git Repositories Tutorial

Jeff Brown

Jeff Brown

Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.

Attack lab: Spear Phishing with Google Drive Sharing

Nathan Coppinger

Nathan Coppinger

Follow along as we show you how scammers are spear phishing with Google Drive sharing to avoid traditonal SPAM filters in Gmail that catch their scams

Varonis Veterans Spotlight: Georgi Georgiev

Belinda Ng

Belinda Ng

Welcome to the Varonis Veteran Spotlight! The purpose of this spotlight is to show our gratitude and appreciation for our Varonis Veterans, as well as honor their military service and...

Your Primer to Third-Party Risk Management

Josue Ledesma

Josue Ledesma

Learn the basics, definitions and best practices of third-party risk management

Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365

Kilian Englert

Kilian Englert

Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.