Inside Out Security Blog   /     /     /  

Threat Update 23 - Bypassing Endpoint Controls Using Office Macros

Threat Update 23 - Bypassing Endpoint Controls Using Office Macros

Contents

    So many attacks start with a simple booby-trapped document that runs malicious code. Crafty attackers can even customize the payload to bypass endpoint controls!

    Don’t believe us? Check out this epic cross-over event, where Kilian and Ryan from Threat Update meet with Kody from SecurityFWD to explore how an attacker would build a “malicious” document that bypasses endpoint controls, establishes a C&C channel, and more!

    Additional Resources

    👉Want to see more of Kody on SecurityFWD? Check out his other videos here: https://info.varonis.com/securityfwd

    👋Did you know Varonis customers can access great educational content to help support them on their journey: https://www.varonis.com/how-to-videos

    To learn how Varonis can help, please visit: https://www.varonis.com/help/

    What you should do now

    Below are three ways we can help you begin your journey to reducing data risk at your company:

    1. Schedule a demo session with us, where we can show you around, answer your questions, and help you see if Varonis is right for you.
    2. Download our free report and learn the risks associated with SaaS data exposure.
    3. Share this blog post with someone you know who'd enjoy reading it. Share it with them via email, LinkedIn, Twitter, Reddit, or Facebook.

    We're Varonis.

    We've been keeping the world's most valuable data out of enemy hands since 2005 with our market-leading data security platform.

    How it works