Advanced Threat Prevention

Security Methods that Detect, Analyze, and Prevent Threats from Malware

Update: Most Destructive Malware of All Time

May 27, 2017 by Yiyi Miao
All malware is inherently dangerous, but there are a few threats that stand out amongst the others when it comes to inflicting damage. We took a look at some of the most destructive malware of all time from traditional viruses, worms and...

Preventing Targeted Attacks That Use JTD or HWP Documents

March 06, 2017 by Taeil Goh
An increasingly popular and effective method of compromising computer security, especially as part of a targeted attack, involves sharing common document types or image files with victims. Even though the original versions of these files...

Ransomware Is Now an Enterprise Threat: How OPSWAT Can Help

February 08, 2017 by Mukul Hinge
What Is Ransomware? In the unlikely event that you've never heard of the most rapidly growing threat in cyber security today, ransomware is a type of malware that is covertly installed on a system, locks or encrypts the data within, and...

How Shamoon Malware Infected Saudi Organizations Again

January 30, 2017 by Chris Qiao
In 2012, the infamous Shamoon virus targeted Saudi Arabia's oil industry and wiped the data of over 35,000 PCs. Now a variant of this malware, called "Shamoon 2" by some, is attacking Saudi organizations again, and this time, it's...

The Best Way to Stop Document-Borne Malware

December 24, 2016 by Yiyi Miao
Attackers often use email attachments as vehicles for malware. It is difficult to defend a network completely from such "document malware" without thoroughly breaking down, scanning, sanitizing, and reconstructing all email...

Image-Borne Malware: How Viewing an Image Can Infect a Device

December 12, 2016 by Chris Qiao
There's nothing dangerous about viewing pictures in a browser, right? Most users with some level of technical knowledge are familiar with typical malware concealment methods, such as document-borne malware. But there's more than one way...

How to Deploy Metadefender Core v4 For an Offline Environment

May 25, 2016 by Tony Berning
Just like MetaDefender Core (Metascan) 3.x, MetaDefender Core 4.x supports deployment in either online or offline environments, although there are some differences between the two versions. Since the process has changed, we would like to...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.