Latest articles
![](https://info.varonis.com/hubfs/Blog_Volatility_BlogHero_202203_FNL.png)
How to Use Volatility for Memory Forensics and Analysis
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Apr 12, 2022
This article will cover what Volatility is, how to install Volatility, and most importantly how to use Volatility.
![](https://info.varonis.com/hubfs/intro-to-ghidra-hero%20%281%29.jpg)
How to Use Ghidra to Reverse Engineer Malware
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Mar 21, 2022
An overview of the malware analysis tool Ghidra. This article covers how to install and navigate the Ghidra interface.
![](https://info.varonis.com/hubfs/malware-types.png)
Common Types of Malware
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Feb 25, 2022
This piece covers the various types of malware that are available and their characteristics.
![](https://142972.fs1.hubspotusercontent-na1.net/hubfs/142972/Imported_Blog_Media/PeStudio-hero.png)
PeStudio Overview: Setup, Tutorial and Tips
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Oct 06, 2021
An overview of the free malware analysis tool PeStudio.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/memory-forensics-hero-2.png)
Memory Forensics for Incident Response
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Jul 26, 2021
When responding to a cybersecurity incident I’ve always found memory forensics to be a great skill to have. By capturing the memory of a compromised device you can quickly perform…
![](https://info.varonis.com/hubfs/Imported_Blog_Media/process-hacker-hero-1.png)
Process Hacker: Advanced Task Manager Overview
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Jun 02, 2021
This article is an overview of the tool Process Hacker. This is a popular tool amongst security professionals when analyzing malware as it will display real-time activity of processes and provide a wealth of technical information on how a particular process is behaving.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/cuckoo-sandbox-hero-1.png)
Cuckoo Sandbox Overview
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
May 26, 2021
A Cuckoo Sandbox is an open-source tool that can be used to automatically analyze malware. Imagine, it’s 2 am in the Security Operations Center (SOC) and an alert has triggered…
![](https://info.varonis.com/hubfs/Imported_Blog_Media/analyze-malware-with-x64dbg-hero.png)
How to Analyze Malware with x64dbg
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
May 21, 2021
This is the fourth and final article in a series of blog posts that serve as an x64dbg tutorial. In this article, we will be taking all the knowledge we…
![](https://info.varonis.com/hubfs/Imported_Blog_Media/yara-rules-hero.png)
YARA Rules Guide: Learning this Malware Research Tool
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
May 17, 2021
YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/stack-memory-hero-1.png)
Stack Memory: An Overview (Part 3)
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Mar 23, 2021
An overview of stack memory, it’s architecture, and how it can be used to reverse-engineer malware using x64dbg.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/How-to-Use-Autoruns-hero.png)
How to Use Autoruns to Detect and Remove Malware on Windows
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Mar 22, 2021
This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/unpack-malware-with-x64dbg-hero.png)
How to Unpack Malware with x64dbg
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Mar 17, 2021
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.
Try Varonis free.
Deploys in minutes.