Advanced Threat Prevention

Security Methods that Detect, Analyze, and Prevent Threats from Malware

10 Things to Include in Your Employee Cyber Security Policy

November 27, 2017
Author: Randy Abrams, Sr. Security Analyst, OPSWAT. When addressing cyber security threats, insider threats have come to the forefront. Insider threats are one of the leading causes of breaches. However, insider threat does not mean the...

FormBook Is the Latest Example of Malware-as-a-Service

October 12, 2017 by Yiyi Miao
Cyber security firm FireEye published a warning last week about the spread of FormBook malware. FormBook steals data, tracks keystrokes, and copies form submissions (hence the "FormBook" name), and it also can receive and execute various...

OPSWAT CEO and Founder Benny Czarny to Speak at SFSU on October 18

October 10, 2017
Our CEO and founder, Benny Czarny, will speak at San Francisco State University's CS Graduate Seminar on October 18th. Benny will present on malware threats hidden in documents, focusing on malicious file uploads and...

How to Defend Against Malware Outbreaks with Secure File Transfer

October 05, 2017
Threats may be present in any file. This is a given, and cyber security defense strategies must take this into account. This is why secure file transfer solutions are essential. MetaDefender Secure File Transfer (SFT) is unique in that it...

Video: How Upwork Eliminated Zero-Day File Attacks with MetaDefender

October 02, 2017
Last year, Upwork had a problem: There was no way to block or eliminate zero-day threats hidden in the file uploads and downloads necessary for their business to function. A couple of weeks ago, Upwork Head of Information Security Teza...

Video: Watch Data Sanitization in Action!

September 27, 2017
Watch as MetaDefender uses data sanitization (Content Disarm and Reconstruction) to strip threats from 100 malicious files, rendering them totally harmless.Data sanitization (CDR) is a powerful and essential threat prevention...

Read Our White Paper: A Primer on File-Borne Malware Threats

September 13, 2017
Cyber criminals will use almost any type of file to conceal and deliver malware, often using social engineering to trick users into opening untrustworthy documents and enabling malicious content.Although the majority of malicious...
Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.