Blog

Data Security

Hacking Wi-Fi With the ESP8266

Kody Kinzie

Kody Kinzie

Hack, monitor, and defend networks using the ESP8266 microcontroller and these Arduino based projects.

Windows Management Instrumentation (WMI) Guide: Understanding WMI Attacks

Michael Buckbee

Michael Buckbee

WMI is a subsystem of PowerShell that can be used to monitor remote systems and users. In this guide, we’ll explain what WMI is, and how to use it.

What Is Cryptojacking? Prevention and Detection Tips

Rob Sobers

Rob Sobers

Learn how cryptocurrency, cryptomining and cryptojacking work — also included are tips to prevent and detect cryptojacking before it's too late

IPv6 Security Guide: Do you Have a Blindspot?

Robert Grimmick

Robert Grimmick

Consider this your ultimate IPv6 security guide, complete with comparisons to IPv4, misconceptions managed, and best practices.

11 Best Malware Analysis Tools and Their Features

Neil Fox

Neil Fox

An overview of 11 notable malware analysis tools and what they are used for, including PeStudio, Process Hacker, ProcMon, ProcDot, Autoruns, and others.

Watch: Varonis ReConnect! Empowering Data Owners to Keep Risk Low

Kilian Englert

Kilian Englert

How do you get the right people access to the data they need faster, and still free up IT to focus on other mission-critical work? Kilian and David walk through...

What is x64dbg + How to Use It

Neil Fox

Neil Fox

Learn more about x64dbg as a malware analysis tool with our full-length guide and tutorial. Contact us for free trials and tutorials in malware protection.

How Hackers Spoof DNS Requests With DNS Cache Poisoning

Michael Raymond

Michael Raymond

An overview of what DNS spoofing and DNS cache poisoning really are and how to protect your organization against them, plus FAQs answers.

Varonis Version 8.5: New Features to Combat Insider Risk in Microsoft 365

Nathan Coppinger

Nathan Coppinger

Varonis version 8.5 is here. Discover organization-wide exposure and learn how to combat insider risk in Microsoft 365 with this new update.

Exfiltrate NTLM Hashes with PowerShell Profiles

Tokyoneon

Tokyoneon

Learn how to exfiltrate NTLM hashes using PowerShell, Mimikatz, Hashcat and other techniques through real code examples, gif walkthroughs and screenshots.

What Is Network Segmentation?

Robert Grimmick

Robert Grimmick

Network segmentation is the act of dividing a computer network into smaller physical or logical components in order to increase security and protect data.

Phishing Attacks: Types, Prevention, and Examples

Robert Grimmick

Robert Grimmick

Phishing attacks use fraud to trick users into revealing information or opening malware. They are a popular attack technique among many types of threat actors.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.