Type to search
Analyze a fileFree Tools

Blog: Content Disarm & Reconstruction

Read Our White Paper: A Primer on File-Borne Malware Threats

How do criminals use common file types to deliver malware? Why do users continue to open malicious documents? Learn the answers in our latest white paper.

Announcing Content Disarm and Reconstruction for Linux

Announcing: the beta release of data sanitization (Content Disarm & Reconstruction) for Linux! Data sanitization protects organizations from document malware.

An In-Depth Look at XML Document Attack Vectors

XML documents can be used in malware attacks. This blog post is for technical readers who would like to see details about XML-based attacks with examples.

'Hacking with Pictures': Stegosploit and How to Stop It

The vast majority of users do not expect an image file to be remotely risky. This makes image-borne malware attacks like Stegosploit particularly dangerous.

OPSWAT Partners with Light Point Security to Offer Full Browser Isolation with Threat-Free Downloads via Content Disarm and Reconstruction

OPSWAT and Light Point Security offer a joint solution that combines Light Point Security's browsing isolation solution with OPSWAT's data sanitization.

Weekly Recap: Threats Detected and Prevented by Metadefender, March 19-26

The most recent malware threats blocked by Metadefender Cloud (free version) using data sanitization (CDR) and multi-scanning are chronicled in this post.

Weekly Recap: Threats Detected and Prevented by Metadefender, March 12-19

The most recent malware threats blocked by Metadefender Cloud (free version) using data sanitization (CDR) and multi-scanning are chronicled in this post.

Recap: Threats Detected and Prevented by Metadefender, Feb 24-March 12

The most recent malware threats blocked by Metadefender Cloud (free version) using data sanitization (CDR) and multi-scanning are chronicled in this post.

Preventing Targeted Attacks That Use JTD or HWP Documents

JTD and HWP files, used in Japan and South Korea, can carry document malware. OPSWAT Metadefender data sanitization (CDR) now supports JTD/HWP files.

Beware of Email Attachments That Seem Harmless

Malware often enters networks through email attachments, including SVG and LNK files. Content Disarm and Reconstruction (data sanitization) can prevent this.