Varonis debuts trailblazing features for securing Salesforce. Learn More

Varonis named a Leader in The Forrester Wave™: Data Security Platforms, Q1 2023

Read the report

Threat Update 23 - Bypassing Endpoint Controls Using Office Macros

1 min read
Last updated Jan 17, 2023

Contents

    So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls!

    Don’t believe us? Check out this epic cross-over event, where Kilian and Ryan from Threat Update meet with Kody from SecurityFWD to explore how an attacker would build a “malicious” document that bypasses endpoint controls, establishes a C&C channel, and more!

    Additional Resources

    👉Want to see more of Kody on SecurityFWD? Check out his other videos here: https://info.varonis.com/securityfwd

    👋Did you know Varonis customers can access great educational content to help support them on their journey: https://www.varonis.com/how-to-videos

    To learn how Varonis can help, please visit: https://www.varonis.com/help/

    What you should do now

    Below are three ways we can help you begin your journey to reducing data risk at your company:

    1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
    2. Download our free report and learn the risks associated with SaaS data exposure.
    3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Twitter, Reddit, or Facebook.

    Free Data Risk Assessment

    Join 7,000+ organizations that traded data darkness for automated protection. Get started in minutes.