
So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls!
Don’t believe us? Check out this epic cross-over event, where Kilian and Ryan from Threat Update meet with Kody from SecurityFWD to explore how an attacker would build a “malicious” document that bypasses endpoint controls, establishes a C&C channel, and more!
Additional Resources
👉Want to see more of Kody on SecurityFWD? Check out his other videos here: https://info.varonis.com/securityfwd
👋Did you know Varonis customers can access great educational content to help support them on their journey: https://www.varonis.com/how-to-videos
To learn how Varonis can help, please visit: https://www.varonis.com/help/