Blog Tag: Trojan

SentinelOne researchers recently identified a new variant of Zusy malware that spreads via PowerPoint presentations — without using macros. Zusy, also...
All malware is inherently dangerous, but there are a few threats that stand out amongst the others when it comes to inflicting damage. We took a look at some...
Application security vulnerabilities are among the most common causes for security issues. Defects in the software can become entry points for hackers and...
In 2012, the infamous Shamoon virus targeted Saudi Arabia's oil industry and wiped the data of over 35,000 PCs. Now a variant of this malware, called...
A new ransomware called PowerWare was recently identified by researchers at Carbon Black. This threat is spreading through phishing emails containing Microsoft...
There have been 5,754 data breaches between November 2005 and November 2015 that have exposed 856,548,312 records. According to their data, there were 783...
Using naming conventions to track the detection of viruses can be difficult because vendors often report the same virus with completely different names, even...
This summer our OPSWAT certification team has analyzed products from over 20 different vendors across over 14 different certification categories and levels...
Since we launched our top threats statistics page on Metascan® Online, we've been monitoring the threats that appear there and analyzing the types of malware...
Back in April, we released a list of common threats that were detected by Metascan® Online and later updated that page by adding statistics on how our...
Among the revelations coming out of the massive data dump from the Hacking Team breach include emails showing that the FBI purchased services and products from...
Blog
25 Jun 2015

June in Review

This June was all about going out with the old, and bringing in the new. We unveiled the new opswat.com, released our latest market share report, and are...