-
Security Bulletins Threat Research
Jun 04, 2024
Targeted Campaign Against Snowflake Customers: What You Need to Know
On May 31st, 2024, Snowflake issued a joint statement with CrowdStrike and Mandiant stating that they are investigating a targeted campaign against Snowflake users with single-factor authentication.
Varonis Threat Labs
4 min read
-
Security Bulletins
Jul 26, 2021
Memory Forensics for Incident Response
When responding to a cybersecurity incident I’ve always found memory forensics to be a great skill to have. By capturing the memory of a compromised device you can quickly perform some analysis to identify potential malware and gather IOC’s which can then be used to identify other compromised devices.
Neil Fox
6 min read
-
Security Bulletins
Jul 06, 2021
REvil Ransomware Attack on Kaseya VSA: What You Need to Know
On July 3rd, at 10:00 AM EST, a malicious hotfix was released and pushed by Kaseya VSA servers that propagated to servers managed by Kaseya, resulting in the compromise and encryption of thousands of nodes at hundreds of different businesses.
Dvir Sason
6 min read
-
Data Security Security Bulletins
May 24, 2021
April 2021 Malware Trends Report
This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.
Ben Zion Lavi
5 min read
-
Data Security Security Bulletins
May 17, 2021
YARA Rules Guide: Learning this Malware Research Tool
YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.
Neil Fox
7 min read
-
Data Security Security Bulletins
Mar 29, 2021
The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees
Hospitals, biotech firms and pharma companies are entrusted to protect sensitive information—from personal patient data to valuable proprietary research–from skilled adversaries looking to grab sensitive data to steal, sell, or extort from victim organizations.
Rachel Hunt
1 min read
-
Data Security PowerShell Security Bulletins
Mar 22, 2021
How to Use Autoruns to Detect and Remove Malware on Windows
Understanding how to use Autoruns means you may be able to detect if your home PC is infected with unwanted software.
Neil Fox
6 min read
-
Data Security Security Bulletins Threat Research
Mar 17, 2021
How to Unpack Malware with x64dbg
In a previous blog post, I explained what x64dbg is and also broke down some of the features of the tool and why they are useful for malware analysis. This article will serve as an x64dbg tutorial in which I will cover the methodology I use when reverse engineering malware and demonstrate how to use the tool to unpack a malware sample.
Neil Fox
11 min read
-
Data Security PowerShell Security Bulletins
Mar 08, 2021
How to Merge in Git: Remote and Local Git Repositories Tutorial
In my previous article “How to Revert a Commit in Git” (a PowerShell Git tutorial), I showed how you can use a local PowerShell Git repository and utilize the benefits of local source control. Using Git, you can create commits or snapshots of your code and revert to previous versions. Typically when working with Git and code repositories, you create the remote one first, then download it to your local system.
Jeff Brown
6 min read
-
Data Security PowerShell Security Bulletins
Feb 22, 2021
Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365
How do you visualize, measure, and reduce internal data exposure in Microsoft 365? What about detecting advanced threats like the SolarWinds attack?
Kilian Englert
1 min read
-
Data Security Security Bulletins
Feb 09, 2021
What Federal Agencies Should Take Away from SolarWinds Attack
It was one of those fragile, oversized wine glasses that couldn’t have cost more than a buck. I saw it teetering on the counter’s edge, soon to meet the kitchen floor. That unmistakable shattering noise was made especially painful by the fact that we had a six-month-old baby who loved to mop the floor with her belly.
Michael J. Wallace
4 min read
-
Data Security PowerShell Security Bulletins
Jan 27, 2021
11 Best Malware Analysis Tools and Their Features
Malware has become a huge threat to organizations across the globe. Something as simple as opening an email attachment can end up costing a company millions of dollars if the appropriate controls are not in place. Thankfully, there are a plethora of malware analysis tools to help curb these cyber threats.
Neil Fox
7 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital