Blog

Security Bulletins

Watch: Varonis ReConnect! Empowering Data Owners to Keep Risk Low

Kilian Englert

Kilian Englert

How do you get the right people access to the data they need faster, and still free up IT to focus on other mission-critical work? Kilian and David walk through...

What is x64dbg + How to Use It

Neil Fox

Neil Fox

Learn more about x64dbg as a malware analysis tool with our full-length guide and tutorial. Contact us for free trials and tutorials in malware protection.

October 2020 Malware Trends Report

Ben Zion Lavi

Ben Zion Lavi

This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.

October 2020 Malware Trends Report

Ben Zion Lavi

Ben Zion Lavi

This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to help you better understand the evolving threat landscape and adapt your defenses accordingly.

Polyrize Acquisition

Yaki Faitelson

Yaki Faitelson

I’m excited to announce today our agreement to acquire Polyrize, a software company whose team and products are a natural fit as part of the Varonis family. This is the first company Varonis has acquired, and I want to give you some background on the strategic rationale for today’s announcement.

The Saga of Trickbot

Michael Buckbee

Michael Buckbee

This is the never-ending story of Trickbot ransomware: the threat, the "takedown," the reboot, the hero. Is Trickbot a threat to democracy? Read on.

How Varonis Helps Stop Emotet

Rob Sobers

Rob Sobers

Our incident response team is tracking an unprecedented number of Emotet malware infections. This post will cover indicators of compromise, mitigations, and how Varonis can help you detect and stop Emotet at each phase of an attack.

Getting the Most Out of Data Transport Engine

Brian Vecci

Brian Vecci

If you don’t need it, get rid of it. If it’s sensitive, make sure sure it’s in the right place, and only accessible to those who need it. Old files...

Working With Windows Local Administrator Accounts, Part II

Michael Buckbee

Michael Buckbee

Before we delve into Restricted Groups, I thought it might be worthwhile to take a closer look at how hackers take advantage of Administrator passwords. For Pass-the-Hash fans, this post...

Finding EU Personal Data With Regular Expressions (Regexes)

Michael Buckbee

Michael Buckbee

If there is one very important but under-appreciated point to make about complying with tough data security regulations such as the General Data Protection Regulation (GDPR), it’s the importance of finding...

Varonis Exposes Global Cyber Campaign: C2 Server Actively Compromising Thousands of Victims

Dolev Taler

Dolev Taler

The Varonis Security Research team discovered a global cyber attack campaign leveraging a new strain of the Qbot banking malware. The campaign is actively targeting U.S. corporations but has hit networks...

Introducing Varonis Data Security Platform 6.4.100: Varonis Edge, GDPR Threat Models, Geolocation and More

Michael Buckbee

Michael Buckbee

It’s the beginning of a new year, and we have a huge new beta release to share with you.  The beta release of the Varonis Data Security Platform 6.4.100 dropped...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.