Type to search
Analyze a file Free Tools

Blog

WinMagic Receives Gold Certification from OPSWAT

WinMagic received Gold certification from the OPSWAT Certified Security Application Program, which tests anti-malware products for compatibility and overall quality.

read more

Metadefender CVEs, Hashes, Application Installers Report: August 7-14

Common Vulnerabilities and Exposures (CVE) is a catalog of known security threats. View the CVEs that the Metadefender Vulnerability Engine now supports.

read more

An In-Depth Look at XML Document Attack Vectors

XML documents can be used in malware attacks. This blog post is for technical readers who would like to see details about XML-based attacks with examples.

Improved Malware Detection or Data Privacy? How to Have BothFuture post

A cyber security firm made some serious allegations about Carbon Black's Cb Response product leaking data. But the issue was with VirusTotal, not Carbon Black.

read more

VMRay Guest Post: Fake Microsoft Word Invoice Hides Malware

Attackers often use social engineering to convince users to enable Microsoft Office macros. Guest author Rohan Viegas of VMRay analyzes an example.

read more

Metadefender CVEs, Hashes, Application Installers Report: July 31-August 7

Common Vulnerabilities and Exposures (CVE) is a catalog of known security threats. View the CVEs, hashes, and installers that the Metadefender Vulnerability Engine now supports.

read more

Event Wrap-Up: RSA Conference 2017 Asia Pacific & Japan

RSA Conference 2017 Asia Pacific & Japan was held at the Marina Bay Sands hotel July 26-28 in Singapore, and the OPSWAT team excited to attend this year.

read more

What Happened in Vegas: Wrap-Up of Black Hat USA 2017

We just closed another year at Black Hat USA, the security industry's premier hacking conference, in Las Vegas, Nevada.

read more

'Hacking with Pictures': Stegosploit and How to Stop It

The vast majority of users do not expect an image file to be remotely risky. This makes image-borne malware attacks like Stegosploit particularly dangerous.

Metadefender CVEs, Hashes, Application Installers Report: July 24-31

Common Vulnerabilities and Exposures (CVE) is a catalog of known security threats. View the CVEs that the Metadefender Vulnerability Engine now supports.

read more