Quantcast
Channel: EN Blog
Browsing all 2151 articles
Browse latest View live
↧

Image may be NSFW.
Clik here to view.

Metadefender: A More Private Alternative to VirusTotal

CISOs in every organization dread the possibility of sensitive company files and data being exposed. Yet the need for up-to-date, actionable threat data is huge. Consequently, many incident response...

View Article


Image may be NSFW.
Clik here to view.

Event Wrap-Up: AWS re:Invent 2017

The OPSWAT team just got back from AWS re:Invent 2017 in Las Vegas, Nevada. At the event last week, we focused on presenting MetaDefender API integrations with AWS cloud infrastructure, which help...

View Article


Image may be NSFW.
Clik here to view.

Metadefender CVEs, Hashes, Application Installers Report: November...

The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...

View Article

Image may be NSFW.
Clik here to view.

Event Wrap-Up: Cyber Security Summit Los Angeles

The 2017 Cyber Security Summit series wrapped up in Los Angeles, California on Wednesday, November 29th. The conference series provides cyber security thought leadership and updates from an executive...

View Article

Image may be NSFW.
Clik here to view.

Metadefender Now Supports Content Disarm and Reconstruction for OpenDocument...

Instead of purchasing the widely used Microsoft Office suite, many users opt to use the free alternatives LibreOffice or Apache OpenOffice. However, these open-source software products contain many...

View Article


Vulnerabilities: CVEs, Hashes, Application Installers Report December 4-11, 2017

The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...

View Article

Image may be NSFW.
Clik here to view.

Webinar Recap: Metadefender Kiosk and NRC Milestone 8 Inspections

This year my colleagues and I were onsite for the first Nuclear Regulatory Commission cyber security program Milestone 8 inspections at the South Texas Project and Monticello nuclear power plants. We...

View Article

Vulnerabilities: CVEs, Hashes, Application Installers Report December 11-18,...

The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...

View Article


Image may be NSFW.
Clik here to view.

How to Integrate Multiple Antivirus APIs

Protecting files, systems, and data against malware attacks requires ever more sophisticated anti-malware solutions as attacks increase in volume and complexity. Especially for enterprises, the...

View Article


Image may be NSFW.
Clik here to view.

6 Reasons Why Traditional Network Access Control Is Dead

In the mid-2000s, network access control (NAC) became the accepted solution for on-premises networks. NAC restricted access for devices that did not comply with company policy or had become infected...

View Article

Vulnerabilities: CVEs, Hashes, Application Installers Report December 25,...

The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...

View Article

Image may be NSFW.
Clik here to view.

Why Advanced Persistent Threats Are Targeting the Internet of Things

Despite an increased focus on cyber security in recent years, the number of data breaches continues to rise. As enterprises focus more (and spend more) on security, cyber criminals are stepping up...

View Article

Vulnerabilities: CVEs, Hashes, Application Installers Report January 1-8, 2018

The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...

View Article


Image may be NSFW.
Clik here to view.

Fake Android Apps Containing Coinhive Miner Identified by Metadefender Cloud

Waqas Amir of HackRead reported on fake Android applications that infect devices with Monero-mining Coinhive earlier this week. Coinhive is a cryptocurrency miner that uses devices' CPU power to mine...

View Article

Image may be NSFW.
Clik here to view.

Cybertech in Tel Aviv, Israel: Hear Benny Czarny Speak

OPSWAT CEO Benny Czarny speaks at Cyber Week in 2017 Cybertech is coming up in Tel Aviv, Israel. The cyber security conference takes place Monday, January 29th through Wednesday, January 31st, and it...

View Article


Vulnerabilities: CVEs, Hashes, Application Installers Report January 8-15, 2018

The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...

View Article

Image may be NSFW.
Clik here to view.

How to Prevent Arbitrary File Disclosure Vulnerability in OpenOffice and...

In early December 2017, OPSWAT announced that OpenDocument Text files are supported in MetaDefender for data sanitization (CDR). Data sanitization, or Content Disarm and Reconstruction (CDR), removes...

View Article


Image may be NSFW.
Clik here to view.

Police Handing Out Malware-Infected USBs Is Not an Isolated Incident

In one of the most ironic pieces of cyber security news in recent months, Taiwanese police inadvertently gave out USB drives containing malware as prizes for a cyber security quiz, as reported by...

View Article

Vulnerabilities: CVEs, Hashes, Application Installers Report January 15-22, 2018

The OPSWAT MetaDefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...

View Article

Image may be NSFW.
Clik here to view.

6 Potential Security Gaps in File Transfer Process for Critical Infrastructure

In September 2017, Wired reported that hackers had gained access to multiple electrical power facilities in the U.S. Conceivably, the hackers could have shut off the power for thousands of citizens...

View Article
Browsing all 2151 articles
Browse latest View live