Advanced Threat Prevention

Security Methods that Detect, Analyze, and Prevent Threats from Malware

Latest Release of OPSWAT Metadefender Chrome Extension Adds Support for Data Sanitization

June 07, 2017
OPSWAT today announced the release of a new version of MetaDefender Chrome Extension with newly added support for MetaDefender data sanitization technology. MetaDefender Chrome Extension now allows Google Chrome users to scan and...

Blocking Malicious File Uploads, Part 1: Best Practices

May 31, 2017 by George Prichici
In order to keep a business running properly, you need to share files with and from internal employees, partners, and customers. File uploading is usually done by the departments that often handle sensitive data — accounting, HR,...

Update: Most Destructive Malware of All Time

May 27, 2017 by Yiyi Miao
All malware is inherently dangerous, but there are a few threats that stand out amongst the others when it comes to inflicting damage. We took a look at some of the most destructive malware of all time from traditional viruses, worms and...

Preventing Targeted Attacks That Use JTD or HWP Documents

March 06, 2017 by Taeil Goh
An increasingly popular and effective method of compromising computer security, especially as part of a targeted attack, involves sharing common document types or image files with victims. Even though the original versions of these files...

Ransomware Is Now an Enterprise Threat: How OPSWAT Can Help

February 08, 2017 by Mukul Hinge
What Is Ransomware? In the unlikely event that you've never heard of the most rapidly growing threat in cyber security today, ransomware is a type of malware that is covertly installed on a system, locks or encrypts the data within, and...

How Shamoon Malware Infected Saudi Organizations Again

January 30, 2017 by Chris Qiao
In 2012, the infamous Shamoon virus targeted Saudi Arabia's oil industry and wiped the data of over 35,000 PCs. Now a variant of this malware, called "Shamoon 2" by some, is attacking Saudi organizations again, and this time, it's...

The Best Way to Stop Document-Borne Malware

December 24, 2016 by Yiyi Miao
Attackers often use email attachments as vehicles for malware. It is difficult to defend a network completely from such "document malware" without thoroughly breaking down, scanning, sanitizing, and reconstructing all email...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.