Data Sanitization

Protecting against malicious files with embedded content

Using Data Sanitization to Block Malicious Macros & More

April 22, 2016 by Tony Berning
A new ransomware called PowerWare was recently identified by researchers at Carbon Black. This threat is spreading through phishing emails containing Microsoft Word documents embedded with malicious macros. We have seen a few examples of...

Can Data Sanitization Stop Ransomware Attacks?

February 29, 2016 by Tony Berning
It was recently reported that Hollywood Presbyterian Medical Center paid a ransom to hackers to regain control of their computer systems. Although the amount of the ransom, $17,000, was not extraordinarily high for a hospital to cover, it...

Video: NIAS Data Sanitization Presentation

November 12, 2015
The NATO information assurance symposium (NIAS) is the NCI Agency's annual cyber security event for NATO organizations and industry partners. This year, OPSWAT's Director of Product Management Szilard Stange gave an in-depth presentation...

Data Sanitization (CDR), Part 3: Active Content Curing

October 08, 2015 by Szilard Stange
After discussing content disarm and reconstruction (CDR) in general in part one of this series and file structure alterations in part two, I am now ready to show you yet another technology that helps provide protection against unknown...

Data Sanitization (CDR), Part 2: File Structure Alterations

August 07, 2015 by Szilard Stange
As mentioned in the introductory post in this series, topic for discussion is content disarm and reconstruction (CDR), or data sanitization, via file structure alteration. In order to take advantage of the software vulnerabilities we...

Deep Content Disarm and Reconstruction (Deep CDR), Part 1: The Case for Data Sanitization

July 09, 2015 by Szilard Stange
Document-based malware exploits are an incredibly common method for attack. The types of malware distributed via this method are representative of today's common threats; they rely on vulnerable applications, typically out-of-date...

How to Stop Macro-Based Malware in Its Tracks

April 03, 2015 by Tony Berning
Recent articles about the Dridex botnet and the Adnel and Tarbir malware have reported a resurgence in malware embedded as macros within Microsoft Office Documents. When looking at malware attached to spam emails, Trend Micro's Trend Labs...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.