AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

Next-Level Threat Detection from OPSWAT Technologies 

Custom File Detection, ASCII-Based QR Code Neutralization, PCAP File Deep Inspection 
by Stella Nguyen, Senior Product Marketing Manager
Share this Post

As cyberthreats continue to evolve, attackers are finding new ways to evade detection through unconventional file types, embedded malicious content, and novel attack vectors. OPSWAT’s latest security enhancements take threat detection to the next level, providing organizations with powerful tools to analyze, classify, and neutralize threats with greater precision. From custom file type detection to deep inspection of PCAPs (network packet captures), these upgrades ensure security teams stay ahead of emerging risks. 

File Type Detection 

Define Custom Rules  

Organizations often encounter files in unique or proprietary formats that standard tools can’t immediately recognize. Waiting for vendor-provided fixes can stall workflows, leaving teams unsure whether to block these files (risking disruption) or allow them (risking exposure).

The File Type Detection engine addresses this with custom rule-based file type detection, enabling organizations to define their own classification logic for unrecognized files.

  • Define your own criteria (e.g., headers, extensions, or byte patterns) to classify unsupported formats. 
  • Act immediately—no need to wait for updates. 
  • Balance security and productivity by tailoring rules to your organization’s specific file-handling policies. 
Screenshot illustrating custom file type detection for advanced threat detection with OPSWAT

This puts control back in your hands, ensuring even niche or new file types align with your workflows. 

Learn more about Custom Detection

Deep CDR 

Provide "Reason for Action" 

Modern documents are more than just text and images—they contain metadata, embedded objects, and even hidden scripts that can serve as attack vectors. While macros are widely recognized as risky, subtler threats like document properties, template references, or QR codes embedded in legacy Office files often evade scrutiny. 

Screenshot illustrating document sanitization and 'Reason for Action' transparency in threat detection

Deep CDR now provides detailed “Reason for Action” explanations, helping security teams understand why specific elements were sanitized. This transparency is crucial for compliance, forensic analysis, and user trust. 

Detect ASCII-Based QR Codes 

Threat actors continuously innovate to evade detection. One emerging tactic involves embedding malicious QR codes in ASCII format. These QR codes, when scanned, can lead to phishing websites or malicious downloads.

ASCII-based QR code for detection and neutralization for threat prevention

Deep CDR now detects and neutralizes ASCII-encoded QR codes, mitigating this novel attack vector before it can be exploited. 

Learn more about QR Code Sanitization

Recursively Sanitize Base64-Encoded JSON Data 

Another critical enhancement is deep inspection of Base64-encoded JSON data. Attackers increasingly embed malicious payloads in encoded strings within API responses or configuration files.

Screenshot illustrating recursive sanitization of Base64-encoded JSON data for threat detection

Deep CDR now includes recursive sanitization functionality for Base64-encoded JSON content, ensuring that: 

  • The Base64-encoded data is decoded. 
  • The extracted content is sanitized. 
  • The sanitized data is re-encoded in Base64 and reinserted into the JSON structure. 

This process ensures that no threats remain embedded within structured data files. 

Learn more about Base64-encoded Data in JSON

Archive Extraction 

Extract and Inspect PCAP Files 

Network packet captures (PCAP files) are a goldmine for forensic investigators, but they’re also a blind spot for many security solutions. Traditional tools often treat PCAPs as opaque containers, ignoring the HTTP, FTP, or IMAP traffic embedded within. This oversight allows attackers to exfiltrate data or deliver malware through seemingly benign network logs. 

Screenshot illustrating PCAP file extraction and inspection for advanced threat detection

Archive Engine now extracts and inspects all packets within PCAP files, applying the same rigorous analysis as standalone files. By reconstructing network sessions and inspecting extracted payloads, security teams can detect: 

  • Malware downloads 
  • Data exfiltration attempts 
  • Command-and-control communications 
Screenshot illustrating detection of malware, data exfiltration, and C2 communications in PCAP analysis

Enable Flexible Configuration via Workflow Integration  

Previously, several global configuration options were restricted at the module level. With this update, key configurations have been moved to workflows, enabling:

  • Greater flexibility in defining security policies. 
  • Easier customization based on organizational needs. 
  • Improved efficiency in managing large-scale security deployments. 
Screenshot illustrating flexible workflow configuration for security policy management in threat detection

Upgrades to Meet Your Needs 

The latest updates to Deep CDR, File Type Verification, and Archive Extraction engines give security teams direct control over how files, documents, and network data are analyzed, so decisions stay rooted in context, not guesswork. To learn more or see these features in action, contact OPSWAT today.

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.