Type to search
Analyze a fileFree Tools

Blog: Content Disarm & Reconstruction

How We Blocked a Word DDE Attack from APT28Posted yesterday

We discovered and sanitized a malicious DDE Word document from threat group APT28, a.k.a. Fancy Bear. Data sanitization was able to remove the DDE code.

Stop Dangerous Ursnif Phishing Attacks with Data Sanitization

A new Ursnif-related spear phishing attack takes social engineering deception to a new level. Why is CDR the best way to combat this banking Trojan?

Data Sanitization Prevents Macro-Less MS Word Attacks

Attacks using the DDE feature of Microsoft Word are on the rise. Such attacks do not use macros and can evade many anti-malware defenses.

OPSWAT CEO and Founder Benny Czarny to Speak at SFSU on October 18

Our CEO and founder, Benny Czarny, will speak at San Francisco State University's CS Graduate Seminar on October 18th. Don't miss this special event!

How to Defend Against Malware Outbreaks with Secure File Transfer

Threats may be present in any file, and cyber security strategies must take this into account. This is why secure file transfer solutions are essential.

Video: How Upwork Cut Zero-Day File Attacks by 70%

On September 21st, OPSWAT and Upwork hosted a joint webinar about advanced threat prevention with data sanitization (Content Disarm and Reconstruction).

OPSWAT Brings Data Sanitization to Windows Endpoints

OPSWAT has extended its data sanitization (CDR) technology to endpoint clients that run Windows via the latest release of Metadefender Client.

Video: Watch Data Sanitization in Action!Future post

Watch as Metadefender uses data sanitization (Content Disarm and Reconstruction) to strip threats from 100 malicious files, rendering them harmless.

Top 5 Ways to Keep Email Inboxes Secure

Email is the primary vector for targeted cyber attacks. If you have not taken steps to increase your organization's email security, it's time to start!

Read Our White Paper: A Primer on File-Borne Malware Threats

How do criminals use common file types to deliver malware? Why do users continue to open malicious documents? Learn the answers in our latest white paper.