Data Security
How APTs Use Reverse Proxies to Nmap Internal Networks
Mar 18, 2021
This Nmap reverse proxies guide will cover proxychains, mitigation, and detection.
How to Unpack Malware with x64dbg
Mar 17, 2021
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.
Detecting Honeypot Access With Varonis
Mar 10, 2021
Honeypots are traps that the Blue Team (defenders) plant to catch potentially bad actors trying to exploit a vulnerability, snoop for data, or escalate privileges. Since a honeypot is a decoy,...
How to Merge in Git: Remote and Local Git Repositories Tutorial
Mar 08, 2021
Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.
Attack lab: Spear Phishing with Google Drive Sharing
Mar 02, 2021
Follow along as we show you how scammers are spear phishing with Google Drive sharing to avoid traditonal SPAM filters in Gmail that catch their scams
Varonis Veterans Spotlight: Georgi Georgiev
Feb 25, 2021
Welcome to the Varonis Veteran Spotlight! The purpose of this spotlight is to show our gratitude and appreciation for our Varonis Veterans, as well as honor their military service and...
Your Primer to Third-Party Risk Management
Feb 22, 2021
Learn the basics, definitions and best practices of third-party risk management
Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365
Feb 22, 2021
Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.
Group Policy Editor Guide: Access Options and How to Use
Feb 19, 2021
Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.
February 2021 Malware Trends Report
Feb 18, 2021
This Februrary 2021 malware trends report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.
What Federal Agencies Should Take Away from SolarWinds Attack
Feb 09, 2021
While patching, threat hunting, and remediation have been the focus of the SolarWinds attack, we can’t ignore the elephant in the room: stolen data.
What is DNS, How it Works + Vulnerabilities
Jan 29, 2021
What is DNS? It’s the address book of the internet. Read on to understand DNS, learn how you are vulnerable to attack through DNS, and how to protect your networks from DNS attacks.
Try Varonis free.
Deploys in minutes.