Deep CDR

Protecting against malicious files with embedded content

Hancitor’s Use Of Cobalt Strike Attack – Can You Prevent It?

January 14, 2022 by Ngoc Nguyen
Summary In July 2021, there was a sophisticated cyber intrusion utilizing a link to Google’s Feed Proxy service to download a harmful Microsoft Word file to the victims’ device. Once the macros were innocently enabled by users, a Hancitor...

Questions to Ask Before You Select a CDR (Content Disarm and Reconstruction) Technology to Protect Your Business from Cyber Security Attacks

January 11, 2022 by Benny Czarny
At OPSWAT, we built our CDR technology to address zero-day cyber threats that are not detected by next-generation anti-malware and dynamic analysis solutions like sandboxes. The reasons that next-gen antimalware and dynamic analysis...

Entry 531433

December 16, 2021 by Ngoc Nguyen

OPSWAT to Add Three New Avira Technologies to OPSWAT MetaDefender Cloud

September 21, 2021
OPSWAT and Avira have announced that they will expand their partnership to incorporate three Avira technologies into OPSWAT MetaDefender Cloud: the Avira anti-malware engine, File Reputation and Web Reputation services. These technologies...

Microsoft Reports Zero-Day CVE-2021-40444, and What You Can Do

September 16, 2021 by Vinh Lam, Senior Software Architect
The CVE-2021-40444 vulnerability can enable cybercriminals to gain remote control of a compromised system and create zero-day attacks in the wild. 

Macro Security is a Big Problem for Microsoft Documents

September 07, 2021 by Vinh Lam, Senior Software Architect
Security researchers have once again demonstrated why Microsoft acknowledges that “unexpected macros can pose a significant security risk.” In a recent blog post, security researchers explain how attackers are using macros to download and...

Excel 4.0 Macro: Old Feature, New Attack Technique

July 26, 2021 by Vinh Lam, Senior Software Architect
Excel 4.0 macro, also known as XLM 4.0 macro, is a benign record-and-playback feature of Microsoft Excel that was introduced back in 1992. This piece of programming code is a solution to automating repetitive tasks in Excel, but...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Inscrivez-vous pour les mises à jour du blog
Obtenez des informations et des idées auprès des leaders de la prévention avancée des menaces.