Security Bulletins
How to Unpack Malware with x64dbg
Mar 17, 2021
This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.
How to Merge in Git: Remote and Local Git Repositories Tutorial
Mar 08, 2021
Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.
Threat Update - Mass Exploitation of On-Prem Exchange Servers
Mar 04, 2021
On March 2nd, Microsoft released an urgent software update to patch 4 critical vulnerabilities in Exchange Server 2010, 2013, 2016, and 2019. Our IR and Forensics teams are actively helping organizations patch,...
Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365
Feb 22, 2021
Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.
Threat Update 26 - Living with Supply Chain Attacks
Feb 19, 2021
Join Kilian Englert and Ryan O'Boyle from the Varonis Incident Response team as they discuss some recent supply chain attacks targeting French organizations...
Threat Update #25 - HelloRansomware: A Look at the CD Projekt Red Attack
Feb 11, 2021
Love hacking in Cyberpunk? So do we! What about in real life? Not so much! Join Kilian Englert and Ryan O’Boyle from the Varonis Incident Response team as they discuss...
What Federal Agencies Should Take Away from SolarWinds Attack
Feb 09, 2021
While patching, threat hunting, and remediation have been the focus of the SolarWinds attack, we can’t ignore the elephant in the room: stolen data.
Threat Update 23 - Bypassing Endpoint Controls Using Office Macros
Feb 01, 2021
So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls! Don’t believe us? Check out this...
11 Best Malware Analysis Tools and Their Features
Jan 27, 2021
An overview of 11 notable malware analysis tools and what they are used for, including PeStudio, Process Hacker, ProcMon, ProcDot, Autoruns, and others.
Watch: Varonis ReConnect! Empowering Data Owners to Keep Risk Low
Jan 27, 2021
How do you get the right people access to the data they need faster, and still free up IT to focus on other mission-critical work? Kilian and David walk through...
What is x64dbg + How to Use It
Jan 27, 2021
Learn more about x64dbg as a malware analysis tool with our full-length guide and tutorial. Contact us for free trials and tutorials in malware protection.
Threat Update 21 - SolarLeaks
Jan 15, 2021
The initial news of the SolarWinds supply chain attack was a devastating revelation to many organizations. It didn’t take the cybercriminal world long to try to profit off of this...
Try Varonis free.
Deploys in minutes.