Blog Tag: Phishing

Cyber security firm FireEye published a warning last week about the spread of FormBook malware. FormBook steals data, tracks keystrokes, and copies form...
Over 7% of phishing emails successfully trick users into opening malicious links or attachments, per Verizon — and Proofpoint research shows that 25.5%...
Multiple nuclear power plants in the U.S. have faced cyber attacks and experienced breaches over the last couple of months, according to recent reports from...
The 29th annual FIRST Conference was held in San Juan, Puerto Rico during the week of June 11-16. I represented OPSWAT at the event, which is an...
All malware is inherently dangerous, but there are a few threats that stand out amongst the others when it comes to inflicting damage. We took a look at some...
A vulnerability is a security flaw in an application that attackers can exploit. Vulnerabilities leave software and systems open to all sorts of cyber...
Since last week, users and organizations in over 100 countries, including major corporations and various government agencies, have fallen victim to the...
What Is Ransomware? In the unlikely event that you've never heard of the most rapidly growing threat in cyber security today, ransomware is a type of...
In 2012, the infamous Shamoon virus targeted Saudi Arabia's oil industry and wiped the data of over 35,000 PCs. Now a variant of this malware, called...
OPSWAT today announced the release of their Content Disarm & Reconstruction Report, a unique report that provides examples of various types of document-based...
Attackers often use email attachments as vehicles for malware. It is difficult to defend a network completely from such "document malware" without thoroughly...
OPSWAT today released free data sanitization (CDR) for all web and API users of their cloud-based threat intelligence platform, MetaDefender Cloud, allowing...