-
Data Security PowerShellJan 27, 2021
Top 11 Malware Analysis Tools and Their Features
Explore 11 powerful malware analysis tools including traditional and AI-powered options that help security teams detect, dissect, and understand modern threats.
Neil Fox
8 min read
-
Data SecurityJan 27, 2021
Watch: Varonis ReConnect! Empowering Data Owners to Keep Risk Low
How do you get the right people access to the data they need faster, and still free up IT to focus on other mission-critical work? Kilian and David walk through...
Kilian Englert
1 min read
-
Data SecurityJan 27, 2021
What is x64dbg + How to Use It
Learn more about x64dbg as a malware analysis tool with our full-length guide and tutorial. Contact us for free trials and tutorials in malware protection.
Neil Fox
5 min read
-
Data SecurityJan 27, 2021
How Hackers Spoof DNS Requests With DNS Cache Poisoning
An overview of what DNS spoofing and DNS cache poisoning really are and how to protect your organization against them, plus FAQs answers.
Michael Raymond
9 min read
-
Data SecurityJan 19, 2021
Varonis Version 8.5: New Features to Combat Insider Risk in Microsoft 365
Varonis version 8.5 is here. Discover organization-wide exposure and learn how to combat insider risk in Microsoft 365 with this new update.
Nathan Coppinger
4 min read
-
Data SecurityJan 15, 2021
Exfiltrate NTLM Hashes with PowerShell Profiles
Learn how to exfiltrate NTLM hashes using PowerShell, Mimikatz, Hashcat and other techniques through real code examples, gif walkthroughs and screenshots.
Tokyoneon
10 min read
-
Data SecurityJan 05, 2021
What Is Network Segmentation?
Network segmentation is the act of dividing a computer network into smaller physical or logical components in order to increase security and protect data.
Robert Grimmick
4 min read
-
Data SecurityDec 23, 2020
Phishing Attacks: Types, Prevention, and Examples
Phishing attacks use fraud to trick users into revealing information or opening malware. They are a popular attack technique among many types of threat actors.
Robert Grimmick
9 min read
-
Threat ResearchDec 18, 2020
SolarWinds SUNBURST Backdoor: Inside the Stealthy APT Campaign
Learn how detect and defend against the SolarWinds Sunburst malware that has compromised versions of SolarWinds’ Orion solution
Snir Ben Shimol
7 min read
-
PowerShellDec 03, 2020
How to Connect to Office 365 PowerShell: Azure AD Modules
Connecting PowerShell to Office 365 makes management easier, more productive, and can unlock hidden features. In this guide, we’ll show you how.
Jeff Brown
7 min read
-
Data SecurityNov 23, 2020
What is a Port Scanner and How Does it Work?
Port scanners are essential tools for both red teamers and blue teamers. Learn more about how they work in this blog.
Michael Buckbee
7 min read
-
Data SecurityNov 23, 2020
What is Role-Based Access Control (RBAC)?
Role-based access control is a framework for granting end users access to systems, applications, and data based on their designated roles in IaaS environments.
Daniel Miller
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital