Security Bulletins
![](https://info.varonis.com/hubfs/Snowflake_BreakingNews_BlogHero_V2.png)
Targeted Campaign Against Snowflake Customers: What You Need to Know
![Varonis Threat Labs](https://info.varonis.com/hubfs/VTL_ProfileImage.png)
Jun 04, 2024
Recent data breaches of prominent Snowflake cloud customers highlight the risks of compromised cloud storage accounts.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/memory-forensics-hero-2.png)
Memory Forensics for Incident Response
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Jul 26, 2021
When responding to a cybersecurity incident I’ve always found memory forensics to be a great skill to have. By capturing the memory of a compromised device you can quickly perform…
![](https://info.varonis.com/hubfs/Imported_Blog_Media/azure-virtual-network-hero-1.png)
REvil Ransomware Attack on Kaseya VSA: What You Need to Know
![Dvir Sason](https://info.varonis.com/hubfs/dvir-sason.jpg)
Jul 06, 2021
A malicious hotfix was released by Kaseya VSA servers resulting in the compromise and encryption of thousands of nodes at hundreds of businesses by REvil.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/Blog_GenericVariant-9-2.png)
April 2021 Malware Trends Report
![Ben Zion Lavi](https://info.varonis.com/hubfs/ben-zion-lavi.jpg)
May 24, 2021
This report is a monthly round-up from the Varonis Forensics Team documenting activity observed while responding to incidents, performing forensics, and reverse engineering malware samples. This report is intended to…
![](https://info.varonis.com/hubfs/Imported_Blog_Media/yara-rules-hero.png)
YARA Rules Guide: Learning this Malware Research Tool
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
May 17, 2021
YARA rules are used to classify and identify malware samples by creating descriptions of malware families based on textual or binary patterns.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/Healthcare-Data-Risk-Report-hero-blog.png)
The 2021 Healthcare Data Risk Report Reveals 1 Out of Every 5 Files is Open to All Employees
![Rachel Hunt](https://info.varonis.com/hubfs/Headshots/rachel-hunt.jpg)
Mar 29, 2021
The Varonis 2021 Healthcare Data Risk Report found 20% of all files at hospitals, biotech firms and pharma companiesare open to every employee.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/How-to-Use-Autoruns-hero.png)
How to Use Autoruns to Detect and Remove Malware on Windows
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Mar 22, 2021
This article acts as a tutorial on how to use Sysinternals Autoruns to detect potentially unwanted software that is installed and running automatically on your device.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/unpack-malware-with-x64dbg-hero.png)
How to Unpack Malware with x64dbg
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Mar 17, 2021
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/How-To-Merge-In-Git-Hero.png)
How to Merge in Git: Remote and Local Git Repositories Tutorial
![Jeff Brown](https://info.varonis.com/hubfs/jeff-brown-web-150x150.jpg)
Mar 08, 2021
Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/reconnect-varonis-1.png)
Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365
![Kilian Englert](https://info.varonis.com/hubfs/Varonis_June2021/Images/killian-englert-200x200.jpg)
Feb 22, 2021
Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/Blog_FedSolarwinds_202103_FNL.png)
What Federal Agencies Should Take Away from SolarWinds Attack
![Michael J. Wallace](https://info.varonis.com/hubfs/Imported%20images/mike-wallace.jpeg)
Feb 09, 2021
While patching, threat hunting, and remediation have been the focus of the SolarWinds attack, we can’t ignore the elephant in the room: stolen data.
![](https://info.varonis.com/hubfs/Imported_Blog_Media/malware-analysis-tools-hero.png)
11 Best Malware Analysis Tools and Their Features
![Neil Fox](https://info.varonis.com/hubfs/neilfox.jpg)
Jan 27, 2021
An overview of 11 notable malware analysis tools and what they are used for, including PeStudio, Process Hacker, ProcMon, ProcDot, Autoruns, and others.
Try Varonis free.
Deploys in minutes.