XML documents can be used in malware attacks. This blog post is for technical readers who would like to see details about XML-based attacks with examples.
The vast majority of users do not expect an image file to be remotely risky. This makes image-borne malware attacks like Stegosploit particularly dangerous.
In this post, I will explain how Metadefender antivirus API integrations enable file upload security solutions that block malicious file uploads.
Attackers have breached U.S. nuclear plants, using malicious email attachments to gain employee credentials. Data sanitization can block attacks like these.
OPSWAT was proud to sponsor the 7th annual Cyber Week at Tel Aviv University June 25-29. CEO Benny Czarny delivered a keynote address at the conference.
Allowing file uploads can be dangerous. Learn how to use antivirus APIs in order to protect systems from malicious file uploads.
The 29th annual FIRST Conference was held in San Juan, Puerto Rico during the week of June 11-16. I had a great time representing OPSWAT at the event.
OPSWAT Metadefender data sanitization (CDR) now supports XML document sanitization to address many of the potential threats of using XML documents.
A new variant of Zusy spreads via PowerPoint presentations but does not use macros. Find out how data sanitization stops this document-borne malware.
The new version of Metadefender Chrome Extension adds support for Content Disarm and Reconstruction for protection against document-based malware exploits.
Please enter a valid email address
Thanks for subscribing!