Fighting Where They Aren't: How Attackers Avoid Endpoints in Modern Attacks


Posted on in Presentations

Cybercriminals are constantly evolving their tactics. In this session, we'll show how attackers sidestep endpoints through real-life attack scenarios like creating malicious Microsoft 365 apps, exploiting vulnerable remote access gateways, and compromising the software supply chain. We'll dive into exactly how these attacks are carried out and give strategies to better defend against them.


Participants
Snir Ben-Shimol

Speaker

, Cider Security

Brian Vecci

Speaker

Field CTO, Varonis

Hackers & Threats

data security endpoint security hackers & threats incident response threat intelligence


Topic

Subtopic


Share With Your Community