Type to search
Analyze a fileFree Tools

Blog: data sanitization (CDR)

OPSWAT CEO and Founder Benny Czarny to Speak at SFSU on October 18

Our CEO and founder, Benny Czarny, will speak at San Francisco State University's CS Graduate Seminar on October 18th. Don't miss this special event!

How to Defend Against Malware Outbreaks with Secure File Transfer

Threats may be present in any file, and cyber security strategies must take this into account. This is why secure file transfer solutions are essential.

Video: How Upwork Cut Zero-Day File Attacks by 70%

On September 21st, OPSWAT and Upwork hosted a joint webinar about advanced threat prevention with data sanitization (Content Disarm and Reconstruction).

OPSWAT Brings Data Sanitization to Windows Endpoints

OPSWAT has extended its data sanitization (CDR) technology to endpoint clients that run Windows via the latest release of Metadefender Client.

Video: Watch Data Sanitization in Action!Future post

Watch as Metadefender uses data sanitization (Content Disarm and Reconstruction) to strip threats from 100 malicious files, rendering them harmless.

Top 5 Ways to Keep Email Inboxes Secure

Email is the primary vector for targeted cyber attacks. If you have not taken steps to increase your organization's email security, it's time to start!

Read Our White Paper: A Primer on File-Borne Malware Threats

How do criminals use common file types to deliver malware? Why do users continue to open malicious documents? Learn the answers in our latest white paper.

Announcing Content Disarm and Reconstruction for Linux

Announcing: the beta release of data sanitization (Content Disarm & Reconstruction) for Linux! Data sanitization protects organizations from document malware.

An In-Depth Look at XML Document Attack Vectors

XML documents can be used in malware attacks. This blog post is for technical readers who would like to see details about XML-based attacks with examples.

'Hacking with Pictures': Stegosploit and How to Stop It

The vast majority of users do not expect an image file to be remotely risky. This makes image-borne malware attacks like Stegosploit particularly dangerous.