Fighting Attacks Using CAD application files
OPSWAT Data Sanitization (Content Disarm and Reconstruction) focuses on the application file (e.g., Microsoft Office document) to keep it from being used as a delivery method for unknown threats...
View ArticleOPSWAT CVEs, Hashes, Application Installers Update: July 4 - July 11, 2018
The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View ArticleOPSWAT CVEs, Hashes, Application Installers Update: July 11 - July 18, 2018
The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View ArticleSingapore Hack – How Did it Happen and Could it Have Been Prevented?
The Singapore government today reported that hackers have stolen personal data belonging to some 1.5 million people, calling it "the most serious breach of personal data" the country had experienced....
View ArticleInfographic: File Upload Security – A Mission Against Malware
File uploads are essential for many web portals but also pose an attack vector for cyber criminals. Did you know that web application attacks were the #1 source of successful data breaches in 2017?...
View ArticleVideo: How Upwork Eliminated Zero-Day File Attacks with MetaDefender
Last year, Upwork had a problem: There was no way to block or eliminate zero-day threats hidden in the file uploads and downloads necessary for their business to function. A couple of weeks ago,...
View ArticleCloud Access Control: Test Drive Available from the OPSWAT Portal
In the recent “Voice of the Enterprise: Information Security, Workloads and Key Projects 2018” report[1] published by 451 Research, 35% of the more than 500 IT decision makers surveyed cited...
View ArticleOPSWAT CVEs, Hashes, Application Installers Update: July 18 - July 25, 2018
The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View ArticleLightboard Lesson: F5 BIG-IP and MetaDefender ICAP Server Integration
In this Lightboard Lesson, John Wagnon from F5 Networks outlines the power of combining F5® BIG-IP® Load Traffic Manager™ (LTM®) with MetaDefender ICAP Server to protect web applications against known...
View ArticleDefending Against SettingContent-MS being used in MS Office and PDF Files
Summary SettingContent-ms is an XML file that allows users to create a shortcut to Windows 10 setting pages. Recently a serious vulnerability was published by Matt Nelson, a researcher at SpecterOps....
View ArticleMetaDefender Cloud - Simplified API Calls
For all of our customers that are using MetaDefender Cloud, we have launched a new feature for API Calls. To make it easier for you to use MetaDefender Cloud, the OPSWAT team has reduced the number of...
View ArticleOPSWAT CVEs, Hashes, Application Installers Update: July 25 - August 1, 2018
The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View ArticleOPSWAT 製品をハンズオンで習得できる世界初「OPSWAT Academy」 開講
2018年7月26日、OPSWAT Japanの 国内一次代理店パートナー ネットワンパートナーズ株式会社 は、OPSWAT 製品のグローバルのベストプラクティスを元にOPSWAT製品技術者を育成すべく「OPSWAT Academy」を開講しました。...
View ArticleThe world's first "OPSWAT Academy with hands-on product training”...
On July 26, 2018, Net One Partners Co., Ltd., OPSWAT Japan's primary distributor, launched "OPSWAT Academy" to train OPSWAT product engineers based on global best practices of OPSWAT products. This...
View ArticleTSMC Virus Attack and the Need for a Secure Data Workflow for Manufacturing...
Details of the TSMC Virus Attack On Friday, 3 August 2018, the Taiwan Semiconductor Manufacturing Company (TSMC) was reportedly hit with a variant of the 2017 WannaCry ransomware, and from current...
View ArticleMetaAccess Client SDK with OESIS Released for OEMs
We are excited to announce the release of the MetaAccess Client SDK for OEMs. The MetaAccess Client SDK can now be used to deploy both MetaAccess and OESIS Framework with the added benefits of...
View ArticleMetaDefender Cloud - New Voting Feature
At OPSWAT, we are constantly updating the threat intelligence we have on files and working to connect different analytics together. We know that security is now a top priority in virtually every...
View ArticleMetaDefender Core - New Package Efficacy Report
We are happy to introduce a new calculation method for our package efficacy report. The storage and processing of the data logs have been optimized and the formulas revised to be faster and more...
View ArticleOPSWAT CVEs, Hashes, Application Installers Update: August 1 - August 8, 2018
The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View ArticleOPSWAT CVEs, Hashes, Application Installers Update: August 8 - August 15, 2018
The OPSWAT Metadefender Vulnerability Engine identifies known application vulnerabilities and reports them by severity level. The Vulnerability Engine allows system administrators to identify...
View Article