Blog

Security Bulletins

Targeted Campaign Against Snowflake Customers: What You Need to Know

Varonis Threat Labs

Varonis Threat Labs

Recent data breaches of prominent Snowflake cloud customers highlight the risks of compromised cloud storage accounts.

Memory Forensics for Incident Response

Neil Fox

Neil Fox

When responding to a cybersecurity incident I’ve always found memory forensics to be a great skill to have. By capturing the memory of a compromised device you can quickly perform…

REvil Ransomware Attack on Kaseya VSA: What You Need to Know

Dvir Sason

Dvir Sason

A malicious hotfix was released by Kaseya VSA servers resulting in the compromise and encryption of thousands of nodes at hundreds of businesses by REvil.

April 2021 Malware Trends Report

Ben Zion Lavi

Ben Zion Lavi

This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to…

YARA Rules Guide: Learning this Malware Research Tool

Neil Fox

Neil Fox

YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.

The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees

Rachel Hunt

Rachel Hunt

The Varonis 2021 Healthcare Data Risk Report found 20% of all files at hospitals, biotech firms and pharma companiesare open to every employee.

How to Use Autoruns to Detect and Remove Malware on Windows

Neil Fox

Neil Fox

This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.

How to Unpack Malware with x64dbg

Neil Fox

Neil Fox

This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.

How to Merge in Git: Remote and Local Git Repositories Tutorial

Jeff Brown

Jeff Brown

Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.

Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365

Kilian Englert

Kilian Englert

Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.

What Federal Agencies Should Take Away from SolarWinds Attack

Michael J. Wallace

Michael J. Wallace

While patching, threat hunting, and remediation have been the focus of the SolarWinds attack, we can’t ignore the elephant in the room: stolen data.

11 Best Malware Analysis Tools and Their Features

Neil Fox

Neil Fox

An overview of 11 notable malware analysis tools and what they are used for, including PeStudio, Process Hacker, ProcMon, ProcDot, Autoruns, and others.

Prev

1 2 3 4

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.