Deep CDR

Protecting against malicious files with embedded content

BLINDINGCAN: A New Trojan Strain Abusing Microsoft Attached Document Template

September 09, 2020 by Vinh Lam
The US Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) have published Malware Analysis Report (AR20-232A) warning of a new strain of malware named “BLINDINGCAN”. This is a remote access...

Automating Content Disarm and Reconstruction (CDR) Testing with OPSWAT Visual Comparison

July 30, 2020 by Nhut Ngo
OPSWAT Deep Content Disarm and Reconstruction (Deep CDR) is an advanced threat prevention technology. Unlike detection-based methods, Deep CDR is designed for eliminating all potential malicious codes from files. Each file is completely...
Tags: Deep CDR

OPSWAT Deep CDR now supports DICOM file format

July 10, 2020 by Vinh Lam
Digital Imaging and Communications in Medicine (DICOM) is an international standard for transmitting, storing, retrieving, printing, and displaying medical imaging information, such as X-ray, CT scans,...
Tags: Deep CDR

Preventing Evasion Techniques in Excel Files with Deep CDR

June 05, 2020 by Vinh Lam
98% of malware threats are equipped with evasion technology and becoming a real problem for cybersecurity.(1) Along with defeating signature-based and behavior-based detection tools, cybercriminals utilize many sophisticated evasion...

Defense Against TA505 Phishing Attacks Using HTML Redirector with Deep CDR

April 28, 2020 by Vinh Lam
TA505 is a cybercrime group that has been active since 2014, targeting Education and Financial institutions. In February 2020, Maastricht University, a public university in the Netherlands, reported that it was a victim of...

Questions to Ask Before You Select a CDR (Content Disarm and Reconstruction) Technology to Protect Your Business from Cyber Security Attacks

March 25, 2020 by Benny Czarny
At OPSWAT, we built our CDR technology to address zero-day cyber threats that are not detected by next-generation anti-malware and dynamic analysis solutions like sandboxes. The reasons that next-gen antimalware and dynamic analysis...

Deep CDR Sanitizes Hidden Threats in an archive file

February 26, 2020 by Vinh Lam
Cybercriminals usually choose archive files to conceal malware and distribute infections. A statistic shows that 37% of detected malicious file extension is an archive, which is quite similar to Office files (38%) but much higher than PDF...
Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.