Latest Articles Oct 13, 2025 | File Security What is Content Disarm and Reconstruction? CDR Explained for CISOs Read More Oct 1, 2025 | File Security How to Stop SVG-Based Phishing Attacks with Deep CDR Read More Jul 8, 2025 | Company News Deep CDR – The Cutting-Edge Weapon Against Hackers Read More Sep 19, 2024 | File Security Five Ways to Prevent Cyberattacks with CDR Technology Read More Jul 11, 2024 | Critical Network Security MetaDefender Transfer Guard Read More Jun 21, 2024 | File Security How Threat Actors Access Sensitive Data in Unexpected Ways Read More Apr 12, 2024 | File Security How Base64 Encoding Opens the Door for Malware Read More Sign up for the OPSWAT Newsletter Get the latest OPSWAT company updates along with event information and the news that's driving the industry forward. Sign Me Up Follow Us on Social Media Follow OPSWAT on your LinkedIn, Facebook, Twitter, and YouTube for more! Explore More Mar 22, 2024 How Emerging Image-Based Malware Attacks Threaten Enterprise Defenses Read More Customer Stories North Grid Meets Regulatory Compliance & Stops EMOTET with MetaDefender Core Read More Oct 16, 2023 Stop QR Code Phishing - Protect Critical Infrastructure Read More Sep 8, 2023 Defend Your Digital Notebook: How to Prevent OneNote Malware Attacks Read More Aug 4, 2023 Must-Have Technologies that Protect Against File-Based Threats Read More Jul 19, 2023 DICOM Anonymization: Enhance Data Security with OPSWAT Proactive Data Loss Prevention Read More Jun 28, 2023 Deep Content Disarm and Reconstruction: A Focal Point in Email Security Against Macro-less Office Files Attacks Read More Jun 16, 2023 Can Malware Be Hidden in Videos? Read More Loading... Load more
Oct 13, 2025 | File Security What is Content Disarm and Reconstruction? CDR Explained for CISOs Read More
Customer Stories North Grid Meets Regulatory Compliance & Stops EMOTET with MetaDefender Core Read More
Jul 19, 2023 DICOM Anonymization: Enhance Data Security with OPSWAT Proactive Data Loss Prevention Read More
Jun 28, 2023 Deep Content Disarm and Reconstruction: A Focal Point in Email Security Against Macro-less Office Files Attacks Read More