accent 1 accent 2
CPE Webinar Replay

How Attackers Weaponize Office Macros


So many attacks start with something seemingly benign.

A user clicks the “Enable Content” button in an Excel file they receive and... nothing happens.

Behind the scenes, however, a backdoor has been opened that gives an attacker everything they need to run shell commands and access sensitive data.


Watch Now

About this webinar

Join Varonis experts as we explore how to build a malicious document that bypasses endpoint controls, establishes a C&C channel, and infiltrates a network.

BONUS: All attendees are eligible to earn 1 (ISC)² CPE credit.

Attend this CPE webinar where we will teach you:
  • How attackers use Office macros to bypass endpoint defenses
  • The tactics used by attackers to establish a C&C channel
  • How layered security controls can protect you from this technique
Andres Julian Marin Salavarrieta
Ryan O'Boyle Security Analytics Manager, Varonis
Kilian Englert
Kilian Englert Technical Marketing Manager, Varonis

“The level of governance and insight provided by Varonis empowered our team to detect and respond to abnormalities as well as user activity and misconfigurations.”

Al Faella, CTO, Prospect Capital Management

Want to see Varonis in action?