Live Cyber Attack Lab 🎯 Watch our IR team detect & respond to a rogue insider trying to steal data! Choose a Session

X

Threat Update 23 – Bypassing Endpoint Controls Using Office Macros

Incident Response, Threat Research

So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls!

Don’t believe us? Check out this epic cross-over event, where Kilian and Ryan from Threat Update meet with Kody from SecurityFWD to explore how an attacker would build a “malicious” document that bypasses endpoint controls, establishes a C&C channel, and more!

Additional Resources

👉Want to see more of Kody on SecurityFWD? Check out his other videos here: https://info.varonis.com/securityfwd

👋Did you know Varonis customers can access great educational content to help support them on their journey: https://www.varonis.com/how-to-videos

To learn how Varonis can help, please visit: https://www.varonis.com/help/

Kilian Englert

Kilian Englert

Kilian has a background in enterprise security engineering, as well as security solution selling. Kilian is a Certified Information Systems Security Professional (CISSP) and creates internal and public content on topics related to cyber security and technology best practices.

 

Does your cybersecurity start at the heart?

Get a highly customized data risk assessment run by engineers who are obsessed with data security.