Blog

Data Security

Working With Windows Local Administrator Accounts, Part III

Michael Buckbee

Michael Buckbee

One point to keep in mind in this series is that we’re trying to limit the powers that are inherent in Administrator accounts. In short: use the Force sparingly. In...

California Consumer Privacy Act (CCPA) vs. GDPR

Michael Buckbee

Michael Buckbee

Check out our interactive Venn diagram below to better understand the similarities and differences between the GDPR and CCPA.

What is ITAR Compliance? Definition and Regulations

Michael Buckbee

Michael Buckbee

Learn more about ITAR compliance, requirements, and penalties. Find the definition, detail of regulations, types of defense articles, and more from Varonis.

Master Fileless Malware Penetration Testing!

Michael Buckbee

Michael Buckbee

Our five-part series brings you up to speed on stealthy techniques used by hackers. Learn how to sneakily run scripts with mshta, rundll32, and regsrvr32, scary Windows binaries that live...

The Top Skills of Fortune 100 CISOs

Rob Sobers

Rob Sobers

What does it take to become a top CISO? We analyzed CISOs of Fortune 100 companies to find the most common skills and educational background of the world's top cybersecurity leaders today.

What is the Colorado Privacy Law?

Michael Buckbee

Michael Buckbee

On September 1, 2018, the Colorado Protections for Consumer Data Privacy law, HB 18-1128, goes into effect. A bi-partisan group introduced HB 18-1128 in January, and after the usual negotiations,...

The Malware Hiding in Your Windows System32 Folder: More Rundll32 and LoL Security Defense Tips

Michael Buckbee

Michael Buckbee

When we left off last, I showed how it’s possible to run VBScript directly from mshta. I can play a similar trick with another LoL-ware binary, our old friend rundll32....

The Malware Hiding in Your Windows System32 Folder: More Alternate Data Streams and Rundll32

Michael Buckbee

Michael Buckbee

Last time, we saw how sneaky hackers can copy malware into the Alternate Data Stream (ADS) associated with a Windows file. I showed how this can be done with the...

The Malware Hiding in Your Windows System32 Folder: Certutil and Alternate Data Streams

Michael Buckbee

Michael Buckbee

We don’t like to think that the core Window binaries on our servers are disguised malware, but it’s not such a strange idea. OS tools such as regsrv32 and mshta...

What Does it Take to Be an Ethical Hacker?

Rob Sobers

Rob Sobers

A white hat hacker, or an ethical hacker, works with agencies and organizations to discover network vulnerabilities and security flaws. Learn what it takes to make hacking your profession with our guide!

The Malware Hiding in Your Windows System32 Folder: Mshta, HTA, and Ransomware

Michael Buckbee

Michael Buckbee

The LoL approach to hacking is a lot like the “travel light” philosophy for tourists. Don’t bring anything to your destination that you can’t find or inexpensively purchase once you’re…

The State of CryptoWall in 2018

Michael Buckbee

Michael Buckbee

CryptoWall and its variants are still favorite toys of the cybercriminals that want your Bitcoin. Learn more about the state of CryptoWall in 2018, today! 

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.