Metadefender: A More Private Alternative to VirusTotal
CISOs in every organization dread the possibility of sensitive company files and data being exposed. Yet the need for up-to-date, actionable threat data is huge. Consequently, many incident response...
View ArticleEvent Wrap-Up: AWS re:Invent 2017
The OPSWAT team just got back from AWS re:Invent 2017 in Las Vegas, Nevada. At the event last week, we focused on presenting MetaDefender API integrations with AWS cloud infrastructure, which help...
View ArticleMetadefender CVEs, Hashes, Application Installers Report: November...
The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View ArticleEvent Wrap-Up: Cyber Security Summit Los Angeles
The 2017 Cyber Security Summit series wrapped up in Los Angeles, California on Wednesday, November 29th. The conference series provides cyber security thought leadership and updates from an executive...
View ArticleMetadefender Now Supports Content Disarm and Reconstruction for OpenDocument...
Instead of purchasing the widely used Microsoft Office suite, many users opt to use the free alternatives LibreOffice or Apache OpenOffice. However, these open-source software products contain many...
View ArticleVulnerabilities: CVEs, Hashes, Application Installers Report December 4-11, 2017
The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View ArticleWebinar Recap: Metadefender Kiosk and NRC Milestone 8 Inspections
This year my colleagues and I were onsite for the first Nuclear Regulatory Commission cyber security program Milestone 8 inspections at the South Texas Project and Monticello nuclear power plants. We...
View ArticleVulnerabilities: CVEs, Hashes, Application Installers Report December 11-18,...
The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View ArticleHow to Integrate Multiple Antivirus APIs
Protecting files, systems, and data against malware attacks requires ever more sophisticated anti-malware solutions as attacks increase in volume and complexity. Especially for enterprises, the...
View Article6 Reasons Why Traditional Network Access Control Is Dead
In the mid-2000s, network access control (NAC) became the accepted solution for on-premises networks. NAC restricted access for devices that did not comply with company policy or had become infected...
View ArticleVulnerabilities: CVEs, Hashes, Application Installers Report December 25,...
The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View ArticleWhy Advanced Persistent Threats Are Targeting the Internet of Things
Despite an increased focus on cyber security in recent years, the number of data breaches continues to rise. As enterprises focus more (and spend more) on security, cyber criminals are stepping up...
View ArticleVulnerabilities: CVEs, Hashes, Application Installers Report January 1-8, 2018
The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View ArticleFake Android Apps Containing Coinhive Miner Identified by Metadefender Cloud
Waqas Amir of HackRead reported on fake Android applications that infect devices with Monero-mining Coinhive earlier this week. Coinhive is a cryptocurrency miner that uses devices' CPU power to mine...
View ArticleCybertech in Tel Aviv, Israel: Hear Benny Czarny Speak
OPSWAT CEO Benny Czarny speaks at Cyber Week in 2017 Cybertech is coming up in Tel Aviv, Israel. The cyber security conference takes place Monday, January 29th through Wednesday, January 31st, and it...
View ArticleVulnerabilities: CVEs, Hashes, Application Installers Report January 8-15, 2018
The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View ArticleHow to Prevent Arbitrary File Disclosure Vulnerability in OpenOffice and...
In early December 2017, OPSWAT announced that OpenDocument Text files are supported in MetaDefender for data sanitization (CDR). Data sanitization, or Content Disarm and Reconstruction (CDR), removes...
View ArticlePolice Handing Out Malware-Infected USBs Is Not an Isolated Incident
In one of the most ironic pieces of cyber security news in recent months, Taiwanese police inadvertently gave out USB drives containing malware as prizes for a cyber security quiz, as reported by...
View ArticleVulnerabilities: CVEs, Hashes, Application Installers Report January 15-22, 2018
The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View Article6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
In September 2017, Wired reported that hackers had gained access to multiple electrical power facilities in the U.S. Conceivably, the hackers could have shut off the power for thousands of citizens...
View Article