Data Sanitization

Protecting against malicious files with embedded content

OPSWAT Brings Data Sanitization to Windows Endpoints

September 29, 2017
OPSWAT today announced the availability of MetaDefender data sanitization (CDR) technology within MetaDefender Client, the company's offering for protecting organizations from malware coming through USB drives and other portable...

Video: Watch Data Sanitization in Action!

September 27, 2017
Watch as MetaDefender uses data sanitization (Content Disarm and Reconstruction) to strip threats from 100 malicious files, rendering them totally harmless.Data sanitization (CDR) is a powerful and essential threat prevention...

Announcing Content Disarm and Reconstruction for Linux

August 21, 2017 by Szilard Stange
Our powerful MetaDefender data sanitization (Content Disarm and Reconstruction) technology is intended to keep any organization safe from document-borne malware, malware-carrying images, and other infected files. We are excited to...

An In-Depth Look at XML Document Attack Vectors

August 14, 2017 by Taeil Goh
In June, we published a short announcement about the beta release of XML document data sanitization (CDR) in which we briefly mentioned the importance of it: "The flexibility of XML has resulted in its widespread usage, including within...

'Hacking with Pictures': Stegosploit and How to Stop It

August 02, 2017
For cyber criminals, image malware is the ideal way to launch a surprise attack. The vast majority of users do not expect a simple image file to be remotely risky. This makes attacks like "Stegosploit" particularly dangerous to both...

Recent Nuclear Breaches Make the Case for Data Sanitization/CDR Threat Prevention

July 10, 2017
Multiple nuclear power plants in the U.S. have faced cyber attacks and experienced breaches over the last couple of months, according to recent reports from The New York Times and Bloomberg. The Department of Homeland Security and the...

Metadefender Now Supports Data Sanitization for XML Documents

June 08, 2017 by Taeil Goh
The flexibility of XML has resulted in its widespread usage, including within Microsoft Office documents and SOAP messages. However, XML documents have many security vulnerabilities that can be targeted for different types of attacks,...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.