-
Data Security
Mar 24, 2021
Addressing New Federal IT Work From Home Risks
This federal IT working from home guide will cover the risks involved and potential solutions.
David Harrington
5 min read
-
Data Security
Mar 23, 2021
Stack Memory: An Overview (Part 3)
An overview of stack memory, it’s architecture, and how it can be used to reverse-engineer malware using x64dbg.
Neil Fox
9 min read
-
Data Security PowerShell Security Bulletins
Mar 22, 2021
How to Use Autoruns to Detect and Remove Malware on Windows
This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.
Neil Fox
6 min read
-
Data Security
Mar 18, 2021
How APTs Use Reverse Proxies to Nmap Internal Networks
This Nmap reverse proxies guide will cover proxychains, mitigation, and detection.
Tokyoneon
4 min read
-
Data Security Security Bulletins Threat Research
Mar 17, 2021
How to Unpack Malware with x64dbg
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.
Neil Fox
11 min read
-
Data Security
Mar 10, 2021
Detecting Honeypot Access With Varonis
Honeypots are traps that the Blue Team (defenders) plant to catch potentially bad actors trying to exploit a vulnerability, snoop for data, or escalate privileges. Since a honeypot is a decoy,...
Michael Buckbee
3 min read
-
Data Security PowerShell Security Bulletins
Mar 08, 2021
How to Merge in Git: Remote and Local Git Repositories Tutorial
Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.
Jeff Brown
6 min read
-
Data Security
Mar 02, 2021
Attack lab: Spear Phishing with Google Drive Sharing
Follow along as we show you how scammers are spear phishing with Google Drive sharing to avoid traditonal SPAM filters in Gmail that catch their scams
Nathan Coppinger
4 min read
-
Data Security PowerShell Security Bulletins
Feb 22, 2021
Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365
Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.
Kilian Englert
1 min read
-
Active Directory Data Security
Feb 19, 2021
Group Policy Editor Guide: Access Options and How to Use
Group Policy Editor (gpedit) is an important part of the Active Directory system administrator’s toolkit. Read this blog for more details about gpedit.
Michael Buckbee
4 min read
-
Data Security
Jan 29, 2021
What is DNS, How it Works + Vulnerabilities
What is DNS? It’s the address book of the internet. Read on to understand DNS, learn how you are vulnerable to attack through DNS, and how to protect your networks from DNS attacks.
Michael Buckbee
9 min read
-
Data Security
Jan 29, 2021
Hacking Wi-Fi With the ESP8266
Hack, monitor, and defend networks using the ESP8266 microcontroller and these Arduino based projects.
Kody Kinzie
4 min read
SECURITY STACK NEWSLETTER
Ready to see the #1 Data Security Platform in action?
Ready to see the #1 Data Security Platform in action?
“I was amazed by how quickly Varonis was able to classify data and uncover potential data exposures during the free assessment. It was truly eye-opening.”
Michael Smith, CISO, HKS
"What I like about Varonis is that they come from a data-centric place. Other products protect the infrastructure, but they do nothing to protect your most precious commodity — your data."
Deborah Haworth, Director of Information Security, Penguin Random House
“Varonis’ support is unprecedented, and their team continues to evolve and improve their products to align with the rapid pace of industry evolution.”
Al Faella, CTO, Prospect Capital