Blog

Data Security

How APTs Use Reverse Proxies to Nmap Internal Networks

Tokyoneon

Tokyoneon

This Nmap reverse proxies guide will cover proxychains, mitigation, and detection.

How to Unpack Malware with x64dbg

Neil Fox

Neil Fox

This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.

Detecting Honeypot Access With Varonis

Michael Buckbee

Michael Buckbee

Honeypots are traps that the Blue Team (defenders) plant to catch potentially bad actors trying to exploit a vulnerability, snoop for data, or escalate privileges. Since a honeypot is a decoy,...

How to Merge in Git: Remote and Local Git Repositories Tutorial

Jeff Brown

Jeff Brown

Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.

Attack lab: Spear Phishing with Google Drive Sharing

Nathan Coppinger

Nathan Coppinger

Follow along as we show you how scammers are spear phishing with Google Drive sharing to avoid traditonal SPAM filters in Gmail that catch their scams

Varonis Veterans Spotlight: Georgi Georgiev

Belinda Ng

Belinda Ng

Welcome to the Varonis Veteran Spotlight! The purpose of this spotlight is to show our gratitude and appreciation for our Varonis Veterans, as well as honor their military service and...

Your Primer to Third-Party Risk Management

Josue Ledesma

Josue Ledesma

Learn the basics, definitions and best practices of third-party risk management

Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365

Kilian Englert

Kilian Englert

Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.

Group Policy Editor Guide: Access Options and How to Use

Michael Buckbee

Michael Buckbee

Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.

February 2021 Malware Trends Report

Ben Zion Lavi

Ben Zion Lavi

This Februrary 2021 malware trends report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.  

What Federal Agencies Should Take Away from SolarWinds Attack

Michael J. Wallace

Michael J. Wallace

While patching, threat hunting, and remediation have been the focus of the SolarWinds attack, we can’t ignore the elephant in the room: stolen data.

What is DNS, How it Works + Vulnerabilities

Michael Buckbee

Michael Buckbee

What is DNS? It’s the address book of the internet. Read on to understand DNS, learn how you are vulnerable to attack through DNS, and how to protect your networks from DNS attacks.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.