Blog Tag: Malware Analysis

MetaDefender Email Gateway Security v5.1.0 - Updates Include Anti-Spam and Anti-Phishing

September 28, 2020 by Janos Rotzik
The New Frontier of Email Security Product Overview The new release of MetaDefender Email Gateway Security significantly expands the level of email security OPSWAT provides. The updated email gateway now provides best-of-breed anti-spam...

Forming a Double Line of Defense Against a RAT: Remote Access Trojan ‘Taidoor’

August 18, 2020
A 12-year old Remote Access Trojan (RAT) that first emerged from the depths in 2008 has now scurried out of its hiding place to spread a new strain of virus in 2020.About the Malware During its history, various strains of this...

Multiscanning – Making Sense of the Numbers

December 10, 2019 by Nelson Nguyen
Reports by antimalware companies claim that they are seeing hundreds of thousands of brand-new unique malware samples every day. For example, Symantec reported seeing 7.8 million unique malware samples in the month of April 2019....

Infographic: File Upload Security – A Mission Against Malware

September 12, 2018 by Yiyi Miao
File uploads are essential for many web portals but also pose an attack vector for cyber criminals. Did you know that web application attacks were the #1 source of successful data breaches in 2017? Check out this infographic and follow...

Is Your Cloud-based Anti-Malware Solution GDPR Compliant?

June 27, 2018 by Yiyi Miao
With General Data Privacy Regulation (GDPR) of the European Union now in full effect, it is important to consider the privacy implications of using cloud-based anti-virus scanners.  GDPR was created to ensure the security of personal...

FormBook Is the Latest Example of Malware-as-a-Service

October 12, 2017 by Yiyi Miao
Cyber security firm FireEye published a warning last week about the spread of FormBook malware. FormBook steals data, tracks keystrokes, and copies form submissions (hence the "FormBook" name), and it also can receive and execute various...

VMRay Guest Post: Fake Microsoft Word Invoice Hides Malware

August 10, 2017
As the VMRay Research Team has written previously, cybercriminals often rely on social engineering techniques to carry out their malicious activities. In large part, this is because Microsoft has been successful in hardening the Windows...

For more information, please contact one of our critical infrastructure cybersecurity experts.