Blog Tag: Content-Disarm-Reconstruction

Our CEO and founder, Benny Czarny, will speak at San Francisco State University's CS Graduate Seminar on October 18th. Benny will present on malware threats...
Threats may be present in any file. This is a given, and cyber security defense strategies must take this into account. This is why secure file transfer...
Last year, Upwork had a problem: There was no way to block or eliminate zero-day threats hidden in the file uploads and downloads necessary for their business...
OPSWAT today announced the availability of MetaDefender data sanitization (CDR) technology within MetaDefender Client, the company's offering for protecting...
Watch as MetaDefender uses data sanitization (Content Disarm and Reconstruction) to strip threats from 100 malicious files, rendering them totally...
Over 7% of phishing emails successfully trick users into opening malicious links or attachments, per Verizon — and Proofpoint research shows that 25.5%...
Cyber criminals will use almost any type of file to conceal and deliver malware, often using social engineering to trick users into opening untrustworthy...
In June, we published a short announcement about the beta release of XML document data sanitization (CDR) in which we briefly mentioned the importance of...
In Part 2 of this blog series, I covered why it is important to do the following things in order to protect systems from malicious file uploads: Scan files...
Multiple nuclear power plants in the U.S. have faced cyber attacks and experienced breaches over the last couple of months, according to recent reports from...
Our powerful MetaDefender data sanitization (Content Disarm and Reconstruction) technology is intended to keep any organization safe from document-borne...
For cyber criminals, image malware is the ideal way to launch a surprise attack. The vast majority of users do not expect a simple image file to be remotely...