Blog

Data Security

The Malware Hiding in Your Windows System32 Folder: More Alternate Data Streams and Rundll32

Michael Buckbee

Michael Buckbee

Last time, we saw how sneaky hackers can copy malware into the Alternate Data Stream (ADS) associated with a Windows file. I showed how this can be done with the...

The Malware Hiding in Your Windows System32 Folder: Certutil and Alternate Data Streams

Michael Buckbee

Michael Buckbee

We don’t like to think that the core Window binaries on our servers are disguised malware, but it’s not such a strange idea. OS tools such as regsrv32 and mshta...

What Does it Take to Be an Ethical Hacker?

Rob Sobers

Rob Sobers

A white hat hacker, or an ethical hacker, works with agencies and organizations to discover network vulnerabilities and security flaws. Learn what it takes to make hacking your profession with our guide!

The Malware Hiding in Your Windows System32 Folder: Mshta, HTA, and Ransomware

Michael Buckbee

Michael Buckbee

The LoL approach to hacking is a lot like the “travel light” philosophy for tourists. Don’t bring anything to your destination that you can’t find or inexpensively purchase once you’re…

The State of CryptoWall in 2018

Michael Buckbee

Michael Buckbee

CryptoWall and its variants are still favorite toys of the cybercriminals that want your Bitcoin. Learn more about the state of CryptoWall in 2018, today! 

Australian Prudential Regulation Authority CPS 234

Michael Buckbee

Michael Buckbee

The Australian Prudential Regulation Authority (APRA) regulates Australia’s financial services industry, including banks, insurance companies, and investments firms. In December 2018, they published the final version of its security framework,...

What's The Difference Between a Proxy and a VPN?

Michael Buckbee

Michael Buckbee

Comparing a proxy vs VPN? We're taking a look at each to help you understand the benefits, drawbacks and steps to deciding which is right for your company!

The Malware Hiding in Your Windows System32 Folder: Intro to Regsvr32

Michael Buckbee

Michael Buckbee

In our epic series on Malware-Free Hacking, I wrote about techniques that let you use well-known Microsoft apps and tools to run evil custom scripts. This file-less hack-craft usually involves sneaking...

What is a Proxy Server and How Does it Work?

Michael Buckbee

Michael Buckbee

A proxy server acts as a gateway between you and the internet. Learn the basics about proxies with our complete, easy-to-follow guide.

What is Spear Phishing?

Michael Buckbee

Michael Buckbee

You might be wondering what is spear phishing. Our guide includes all the information you'll need to know including examples and tips for avoiding an attack

Australian Notifiable Data Breach Scheme, Explained

Michael Buckbee

Michael Buckbee

A third time is a charm, in life and in data breach notifications laws. On February 13, 2017, the Australian government, in its third attempt, passed the Notifiable Data Breaches...

The Anatomy of a Phishing Email

Rob Sobers

Rob Sobers

Have you been hooked by a phishing email? We’ve broken out the most common components of a phishing email. Check out our full guide to test your knowledge!

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.