Blog Tag: Cdr

Deep CDR brought to you by OPSWAT and F5

September 30, 2019
Author: Laura Arciniegas Deep Content Disarm and Reconstruction can be considered a proactive security tool that will allow you to accept productivity files while eliminating the risk of hidden malicious content. Learn about the latest...

Protecting Critical Networks: Power Grid

December 07, 2018 by Yiyi Miao
A recent article talks about the continued targeting of the U.S. power grid by Russia-linked hacking groups, specifically by “TEMP.Isotope.” While the U.S. critical infrastructure continues to improve its cyber defenses, some of the...

Protecting Critical Networks: Maritime Industry

December 07, 2018 by Yiyi Miao
A recent article describes the alarming cyber security issues faced by today’s maritime industry. It is entirely feasible for a hacker to break into a ship’s computer system and alter the ship’s course, for example. The primary...

Data Sanitization against Steganography, Evasion

November 06, 2018 by Taeil Goh
We have warned about the risk of steganography in the previous blog. Steganography is the method of concealing messages, images, videos or malware within a file or a message. We have now observed steganography in actual attacks*. Just...

TSMC Virus Attack and the Need for a Secure Data Workflow for Manufacturing Networks

August 07, 2018 by Yiyi Miao
Details of the TSMC Virus AttackOn Friday, 3 August 2018, the Taiwan Semiconductor Manufacturing Company (TSMC) was reportedly hit with a variant of the 2017 WannaCry ransomware, and from current reports the...