Blog

Data Security

Working With Windows Local Administrator Accounts, Part II

Michael Buckbee

Michael Buckbee

Before we delve into Restricted Groups, I thought it might be worthwhile to take a closer look at how hackers take advantage of Administrator passwords. For Pass-the-Hash fans, this post...

Finding EU Personal Data With Regular Expressions (Regexes)

Michael Buckbee

Michael Buckbee

If there is one very important but under-appreciated point to make about complying with tough data security regulations such as the General Data Protection Regulation (GDPR), it’s the importance of finding...

How To Get Started with PowerShell and Active Directory Scripting

Michael Buckbee

Michael Buckbee

This article is a text version of a lesson from our PowerShell and Active Directory Essentials video course (use code ‘blog’ for free access). The course has proven to be...

Detecting Malware Payloads in Office Document Metadata

Rob Sobers

Rob Sobers

Ever consider document properties like “Company,” “Title,” and “Comments” a vehicle for a malicious payload? Checkout this nifty PowerShell payload in the company metadata: #powershell payload stored in office metadataDocument...

Working With Windows Local Administrator Accounts, Part I

Michael Buckbee

Michael Buckbee

In writing about hackers and their techniques, the issue of Windows local Administrator accounts often comes up. Prior to Windows 7, the Administrator account was created by default with no...

Defining Deviancy With User Behavior Analytics

Matt Radolec

Matt Radolec

For over the last 10 years, security operations centers and analysts have been trading indicators of compromise (IoC), signatures or threshold-based signs of intrusion or attempted intrusion, to try to...

PowerShell Obfuscation: Stealth Through Confusion, Part I

Michael Buckbee

Michael Buckbee

To get into the spirit of this post, you should probably skim through the first few slides of this presentation by Daniel Bohannon and Le Holmes given at Black Hat...

How to use PowerShell Objects and Data Piping

Michael Buckbee

Michael Buckbee

This article is a text version of a lesson from our PowerShell and Active Directory Essentials video course (use code ‘blog’ for free access). The course has proven to be...

More NSA Goodness: Shadow Brokers Release UNITEDRAKE

Michael Buckbee

Michael Buckbee

Looking for some good data security news after the devastating Equifax breach? You won’t find it in this post, although this proposed federal breach notification law could count as a...

Interview With Wade Baker: Verizon DBIR, Breach Costs, & Selling Boardrooms on Data Security

Michael Buckbee

Michael Buckbee

Wade Baker is best known for creating and leading the Verizon Data Breach Investigations Report (DBIR). Readers of this blog are familiar with the DBIR as our go-to resource for...

DNSMessenger: 2017's Most Beloved Remote Access Trojan (RAT)

Michael Buckbee

Michael Buckbee

I’ve written a lot about Remote Access Trojans (RATs) over the last few years. So I didn’t think there was that much innovation in this classic hacker software utility. RATs, of...

How to Protect GDPR Data with Varonis

Michael Buckbee

Michael Buckbee

In the overall data security paradigm, GDPR data isn’t necessarily more important than other sensitive data, but demands specific monitoring, policy, and processing – with significant fines to encourage compliance....

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.