Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session


Threat Update 23 – Bypassing Endpoint Controls Using Office Macros

Incident Response, Threat Research

So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls!

Don’t believe us? Check out this epic cross-over event, where Kilian and Ryan from Threat Update meet with Kody from SecurityFWD to explore how an attacker would build a “malicious” document that bypasses endpoint controls, establishes a C&C channel, and more!

Additional Resources

👉Want to see more of Kody on SecurityFWD? Check out his other videos here:

👋Did you know Varonis customers can access great educational content to help support them on their journey:

To learn how Varonis can help, please visit:

Kilian Englert

Kilian Englert

Kilian has a background in enterprise security engineering, as well as security solution selling. Kilian is a Certified Information Systems Security Professional (CISSP) and creates internal and public content on topics related to cyber security and technology best practices.


Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.