Security Bulletins
Targeted Campaign Against Snowflake Customers: What You Need to Know
Jun 04, 2024
Recent data breaches of prominent Snowflake cloud customers highlight the risks of compromised cloud storage accounts.
Memory Forensics for Incident Response
Jul 26, 2021
When responding to a cybersecurity incident I’ve always found memory forensics to be a great skill to have. By capturing the memory of a compromised device you can quickly perform…
REvil Ransomware Attack on Kaseya VSA: What You Need to Know
Jul 06, 2021
A malicious hotfix was released by Kaseya VSA servers resulting in the compromise and encryption of thousands of nodes at hundreds of businesses by REvil.
April 2021 Malware Trends Report
May 24, 2021
This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to…
YARA Rules Guide: Learning this Malware Research Tool
May 17, 2021
YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.
The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees
Mar 29, 2021
The Varonis 2021 Healthcare Data Risk Report found 20% of all files at hospitals, biotech firms and pharma companiesare open to every employee.
How to Use Autoruns to Detect and Remove Malware on Windows
Mar 22, 2021
This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.
How to Unpack Malware with x64dbg
Mar 17, 2021
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.
How to Merge in Git: Remote and Local Git Repositories Tutorial
Mar 08, 2021
Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.
Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365
Feb 22, 2021
Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.
What Federal Agencies Should Take Away from SolarWinds Attack
Feb 09, 2021
While patching, threat hunting, and remediation have been the focus of the SolarWinds attack, we can’t ignore the elephant in the room: stolen data.
11 Best Malware Analysis Tools and Their Features
Jan 27, 2021
An overview of 11 notable malware analysis tools and what they are used for, including PeStudio, Process Hacker, ProcMon, ProcDot, Autoruns, and others.
Try Varonis free.
Deploys in minutes.