Varonis announces strategic partnership with Microsoft to accelerate the secure adoption of Copilot.

Learn more
Blog

Security Bulletins

How to Unpack Malware with x64dbg

Neil Fox

Neil Fox

This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.

How to Merge in Git: Remote and Local Git Repositories Tutorial

Jeff Brown

Jeff Brown

Follow this PowerShell Git tutorial on how to merge in Git, meaning how to take a local repository and merge it into a remote repository.

Threat Update - Mass Exploitation of On-Prem Exchange Servers

Snir Ben Shimol

Snir Ben Shimol

On March 2nd, Microsoft released an urgent software update to patch 4 critical vulnerabilities in Exchange Server 2010, 2013, 2016, and 2019. Our IR and Forensics teams are actively helping organizations patch,...

Watch: ReConnect - Version 8.5 and Combating Insider Risks in Microsoft 365

Kilian Englert

Kilian Englert

Kilian and Brian walk through the TL;DR version of our Varonis 8.5 and combatting insider risks in Microsoft 365 event. They cover the high-level points, and answer the best questions during the event.

Threat Update 26 - Living with Supply Chain Attacks

Kilian Englert

Kilian Englert

Join Kilian Englert and Ryan O'Boyle from the Varonis Incident Response team as they discuss some recent supply chain attacks targeting French organizations...

Threat Update #25 - HelloRansomware: A Look at the CD Projekt Red Attack

Kilian Englert

Kilian Englert

Love hacking in Cyberpunk? So do we! What about in real life? Not so much! Join Kilian Englert and Ryan O’Boyle from the Varonis Incident Response team as they discuss...

What Federal Agencies Should Take Away from SolarWinds Attack

Michael J. Wallace

Michael J. Wallace

While patching, threat hunting, and remediation have been the focus of the SolarWinds attack, we can’t ignore the elephant in the room: stolen data.

Threat Update 23 - Bypassing Endpoint Controls Using Office Macros

Kilian Englert

Kilian Englert

So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls! Don’t believe us? Check out this...

11 Best Malware Analysis Tools and Their Features

Neil Fox

Neil Fox

An overview of 11 notable malware analysis tools and what they are used for, including PeStudio, Process Hacker, ProcMon, ProcDot, Autoruns, and others.

Watch: Varonis ReConnect! Empowering Data Owners to Keep Risk Low

Kilian Englert

Kilian Englert

How do you get the right people access to the data they need faster, and still free up IT to focus on other mission-critical work? Kilian and David walk through...

What is x64dbg + How to Use It

Neil Fox

Neil Fox

Learn more about x64dbg as a malware analysis tool with our full-length guide and tutorial. Contact us for free trials and tutorials in malware protection.

Threat Update 21 - SolarLeaks

Kilian Englert

Kilian Englert

The initial news of the SolarWinds supply chain attack was a devastating revelation to many organizations. It didn’t take the cybercriminal world long to try to profit off of this...

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.