Data Sanitization

Protecting against malicious files with embedded content

Deep CDR brought to you by OPSWAT and F5

September 30, 2019
Author: Laura Arciniegas Deep Content Disarm and Reconstruction can be considered a proactive security tool that will allow you to accept productivity files while eliminating the risk of hidden malicious content. Learn about the latest...

Content Sanitization and Mobile Security Big Themes at FIC 2019 in France

January 30, 2019
Last week, OPSWAT participated in the International Cybersecurity forum at the Lille Grand Palais, in Lille, France. The International Cybersecurity Forum is a platform aiming at promoting a pan-European vision of cybersecurity as well as...

OPSWAT MetaDefender Protects Against Offensive Zero-Day Capabilities

March 24, 2018 by Jianpeng Mo
Zero-day attacks are no longer limited to hacker groups and companies; governments have been exploring the use of offensive zero-day capabilities. In fact, state actors, including the U.S., are some of the biggest customers for new...

Disarming a Multi-Stage Macro-Less Word Attack with Data Sanitization

March 05, 2018 by Taeil Goh
In November 2017, we published a blog post about how OPSWAT data sanitization (CDR) blocks macro-less attacks that use Microsoft Word documents. Recently, Trustwave published an article describing another...

OPSWAT CEO Benny Czarny Presented on Data Sanitization at SFSU: Watch Presentation

February 20, 2018
Last winter, OPSWAT CEO and Founder Benny Czarny spoke on the subject of data sanitization, or Content Disarm and Reconstruction, at San Francisco State University. Data sanitization (CDR) is a highly important advanced...

How to Prevent Arbitrary File Disclosure Vulnerability in OpenOffice and LibreOffice

January 17, 2018 by Vinh Lam
In early December 2017, OPSWAT announced that OpenDocument Text files are supported in MetaDefender for data sanitization (CDR). Data sanitization, or Content Disarm and Reconstruction (CDR), removes potentially malicious embedded...

How We Blocked a Word DDE Attack from APT28

November 16, 2017
By the OPSWAT Data Sanitization Team Last week, the APT28 threat group (also known as "Fancy Bear") was discovered to be using the Dynamic Data Exchange (DDE) attack method that we described in our recent blog post, "Data Sanitization...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.