Type to search
Analyze a file Free Tools

Blog

Did You Miss Our Webinar About Digital Signing and Verification?

In July, I presented a new feature for Metadefender Kiosk and Client: digital signing and verification. If you missed the webinar, read a recap here.

Metadefender CVEs, Hashes, Application Installers Report: August 21-28

Common Vulnerabilities and Exposures (CVE) is a catalog of known security threats. View the CVEs, hashes, and installers that the Metadefender Vulnerability Engine now supports.

read more

OPSWAT Releases User Profiles for Metadefender Cloud

OPSWAT released user profiles for Metadefender Cloud users, who can now monitor their day-to-day usage and obtain a detailed overview of their API keys.

read more

We Launched Localized Microsites for International Audiences

At OPSWAT, we want to keep the whole world's data secure. To reach audiences around the world, we have launched microsites in multiple languages.

read more

Metadefender CVEs, Hashes, Application Installers Report: August 14-21Future post

Common Vulnerabilities and Exposures (CVE) is a catalog of known security threats. View the CVEs, hashes, and installers that the Metadefender Vulnerability Engine now supports.

read more

Event Wrap-Up: Cyber Security Summit Chicago

The OPSWAT team attended Cyber Security Summit Chicago on August 8 and participated in a panel discussion about compliance with industry data security regulations.

read more

Announcing Content Disarm and Reconstruction for Linux

Announcing: the beta release of data sanitization (Content Disarm & Reconstruction) for Linux! Data sanitization protects organizations from document malware.

WinMagic Receives Gold Certification from OPSWAT

WinMagic received Gold certification from the OPSWAT Certified Security Application Program, which tests anti-malware products for compatibility and overall quality.

read more

Metadefender CVEs, Hashes, Application Installers Report: August 7-14

Common Vulnerabilities and Exposures (CVE) is a catalog of known security threats. View the CVEs that the Metadefender Vulnerability Engine now supports.

read more

An In-Depth Look at XML Document Attack Vectors

XML documents can be used in malware attacks. This blog post is for technical readers who would like to see details about XML-based attacks with examples.

Follow Us

Get our latest research and news in your inbox monthly