Blog

Data Security

Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365

Kilian Englert

Kilian Englert

Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.

Group Policy Editor Guide: Access Options and How to Use

Michael Buckbee

Michael Buckbee

Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.

February 2021 Malware Trends Report

Ben Zion Lavi

Ben Zion Lavi

This Februrary 2021 malware trends report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.  

What Federal Agencies Should Take Away from SolarWinds Attack

Michael J. Wallace

Michael J. Wallace

While patching, threat hunting, and remediation have been the focus of the SolarWinds attack, we can’t ignore the elephant in the room: stolen data.

What is DNS, How it Works + Vulnerabilities

Michael Buckbee

Michael Buckbee

What is DNS? It’s the address book of the internet. Read on to understand DNS, learn how you are vulnerable to attack through DNS, and how to protect your networks from DNS attacks.

Hacking Wi-Fi With the ESP8266

Kody Kinzie

Kody Kinzie

Hack, monitor, and defend networks using the ESP8266 microcontroller and these Arduino based projects.

Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks

Michael Buckbee

Michael Buckbee

WMI is a subsystem of PowerShell that can be used to monitor remote systems and users. In this guide, we’ll explain what WMI is, and how to use it.

What Is Cryptojacking? Prevention and Detection Tips

Rob Sobers

Rob Sobers

Learn how cryptocurrency, cryptomining and cryptojacking work — also included are tips to prevent and detect cryptojacking before it's too late

IPv6 Security Guide: Do you Have a Blindspot?

Robert Grimmick

Robert Grimmick

Consider this your ultimate IPv6 security guide, complete with comparisons to IPv4, misconceptions managed, and best practices.

11 Best Malware Analysis Tools and Their Features

Neil Fox

Neil Fox

An overview of 11 notable malware analysis tools and what they are used for, including PeStudio, Process Hacker, ProcMon, ProcDot, Autoruns, and others.

Watch: Varonis ReConnect! Empowering Data Owners to Keep Risk Low

Kilian Englert

Kilian Englert

How do you get the right people access to the data they need faster, and still free up IT to focus on other mission-critical work? Kilian and David walk through...

What is x64dbg + How to Use It

Neil Fox

Neil Fox

Learn more about x64dbg as a malware analysis tool with our full-length guide and tutorial. Contact us for free trials and tutorials in malware protection.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.