Blog

A perspective on next generation cybersecurity, vulnerabilities, and the cloud.
In Part 2 of this blog series, I covered why it is important to do the following things in order to protect systems from malicious file uploads: Scan files...
Multiple nuclear power plants in the U.S. have faced cyber attacks and experienced breaches over the last couple of months, according to recent reports from...
OPSWAT today announced the release of the next generation of the successful MetaDefender Kiosk product, MetaDefender Kiosk 4.0.0, which includes an overhauled...
If file uploads are essential for your business to run, there are several steps you need to take in order to ensure that no infected, malicious, or otherwise...
A new release from Wikileaks reveals information about a tool the CIA developed in order to infect and spy on targets from wireless routers. Once routers are...
The flexibility of XML has resulted in its widespread usage, including within Microsoft Office documents and SOAP messages. However, XML documents have many...
SentinelOne researchers recently identified a new variant of Zusy malware that spreads via PowerPoint presentations — without using macros. Zusy, also...

Sign up for Blog updates

Get information and insight from the leaders in advanced threat prevention.