It seems like your browser didn't download the required fonts. Please revise your security settings and try again.
Barracuda XDR

Threat Simulation Videos

  • Last updated on

Barracuda XDR Server Security Threat Simulation: Privilege Escalation

Watch this threat simulation video to learn the tactics attackers typically take to escalate their privilege in an environment and how Barracuda XDR Server Security detects & responds to these types of cyberattacks.

Barracuda XDR Network Security Threat Simulation: Communication with Threat Intel IP Address

Watch this threat simulation video to learn what happens when there is a connection between an organization and a known Indicator of Compromise (IOC). Learn how Barracuda XDR Network Security detects & responds to these types of cyberattacks.

Barracuda XDR Email Security Threat Simulation: Suspicious Email Attachment

Watch this threat simulation video to learn how threat actors use malicious email attachments such as OneNote files embedded with remote access trojans and how Barracuda XDR Email Security detects & responds to these types of cyberattacks.

Barracuda XDR Endpoint Security Threat Simulation: New threat mitigated

Watch this threat simulation video to learn how Barracuda XDR Managed Endpoint Security detects and remediates new threats discovered in an environment.

Barracuda XDR Cloud Security Threat Simulation: Impossible Travel

Watch this threat simulation video to learn about key indicators of a successful business email account compromise and how Barracuda XDR Cloud Security detects and responds to these types of cyberattacks.

Barracuda XDR Cloud Security Threat Simulation: Suspicious Inbox Rule

Watch this threat simulation video to learn the tactics attackers typically take during a business email account compromise incident and how Barracuda XDR Cloud Security detects and responds to these types of cyberattacks.

Barracuda XDR Cloud Security Threat Simulation: PIM user granted administrator role in Azure

Watch this threat simulation viideo to learn to detect an administrator role being added to a PIM user. Threat actors might give an account they’ve compromised increased permissions as a means of persistence, just in case they get kicked out of the account they are currently using.