MetaDefender Cloud v3.77.0 Release
Product Overview
OPSWAT MetaDefender Cloud provides cyber security professionals and consumers with threat detection, prevention and reputation services which can be accessed via a public API or web browser.
MetaDefender Cloud services include:
- Detecting malicious files using multiple antimalware engines.
- Reputation of URLs and IPs.
- Generating threat-free files using Data Sanitization (Content, Disarm and Reconstruction). This service does not rely on threat detection.
- Vulnerability assessment of software binaries, installers, and firmware.
- Threat intelligence feed.
New In This Release
- Announcing V4 API: because switching between MetaDefender API and MetaDefender Cloud API should be as seamless as possible, we created MetaDefender Cloud API V4, our fastest and easiest to use API so far. This version is fully compatible with MetaDefender API and will replace all previous API versions. Head over to our documentation page to find out more!
- Android manifest metadata starting with this release, all Android APK files uploaded will have manifest metadata information extracted, analyzed and displayed in the UI:

The metadata reveals information like intents, services and permissions, which reveal the potential for malicious behavior in apps.
Release Details
- Product: MetaDefender Cloud
- Release date: 08 Mar 2019
- Release notes: 3.77.0

- Academy 11
- Advanced Threat Prevention 55
- CEO's Blog 20
- Company Announcements 33
- Cross-Domain Solutions 2
- CTO's Blog 23
- CVEs 189
- Deep CDR 40
- Email Security 1
- Email Threat Prevention 21
- File Upload Security 3
- Kiosk & USB Security 31
- Malware Analysis 1
- OACCP Certification 29
- OESIS Framework 12
- Product Announcements 173
- Reports 28
- Secure Access 23
- Secure Data Storage 5
- Technology Partnerships 37
- Vulnerabilities 21
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- OPSWAT Released a New Advanced Email Security Comparison Guide
- Infographic: File Upload Security – A Mission Against Malware
- Can You Spot the Social Engineering Techniques in a Phishing Email?
- Vulnerabilities: CVEs, Hashes, Application Installers Report January 22-29, 2018
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- Police Handing Out Malware-Infected USBs Is Not an Isolated Incident
- 10 Things to Include in Your Employee Cyber Security Policy
- 11 of the Largest Data Breaches of All Time (Updated)