Researchers identified a Microsoft Word document-based attack that does not use macros and has multiple stages. OPSWAT data sanitization disarms this attack.
Taiwanese police accidentally gave out USB drives containing malware as prizes for a security quiz, but the problem of infected USBs extends much further.
We discovered and sanitized a malicious DDE Word document from threat group APT28, a.k.a. Fancy Bear. Data sanitization was able to remove the DDE code.
A new Ursnif-related spear phishing attack takes social engineering deception to a new level. Why is CDR the best way to combat this banking Trojan?
Attacks using the DDE feature of Microsoft Word are on the rise. Such attacks do not use macros and can evade many anti-malware defenses.
FormBook malware is targeting South Korea and the U.S. and spreads via malicious email attachments, including malicious PDF, Word, and archive files.
Recently there was a presidential order to remove any deployment of Kaspersky Lab from any federal department and agency. Here is my response.
A cyber security firm made some serious allegations about Carbon Black's Cb Response product leaking data. But the issue was with VirusTotal, not Carbon Black.
Attackers have breached U.S. nuclear plants, using malicious email attachments to gain employee credentials. Data sanitization can block attacks like these.
Yet another large-scale ransomware attack broke out this week. Possibly a variant of Petya ransomware, the malware infected organizations around the world.