Type to search
Analyze a file Free Tools

Blog

Image-Borne Malware: How Viewing an Image Can Infect a Device

It's possible for malware to be hidden in an image through a 'hacking with pictures' technique called Stegosploit. Learn more about this cyber security threat.

read more

OPSWAT and ICSA Labs Team Up to Enhance OPSWAT Certification Program

The enhanced partnership between OPSWAT and ICSA Labs will ensure that only devices using high-quality anti-malware applications can gain access to a secure network.

read more

We Exceeded Our 'Team for Kids' Fundraising Goal

Thanks for supporting me and my fellow executives in fundraising for Team for Kids for the New York marathon. With your help, we surpassed our fundraising goal!

read more

Event Wrap Up: OPSWAT Cyber Security Seminar in Israel

We just finished hosting another successful event, the OPSWAT Cyber Security Seminar, held at the Israeli Air Force House in Herzliya, Israel. Along with our Israeli partners, eBusiness Design and Bulwarx, we held a seminar to demonstrate the latest research in the cyber security industry and showcased newest products and features as well as integrated solutions. 

read more

OPSWAT Releases Updated and Expanded OESIS Support Charts

We recently updated our OESIS support charts to make it easier to find the anti-malware, patch management, and encryption applications that are OPSWAT certified.

read more

Update On Multi-scanning Engine Licensing Options

Our relationships with our Metadefender Core and Metadefender Cloud engine providers are extremely important to us. In order to maintain a strong relationship, we wanted to emphasize that our multi-scanning technology has different licensing options for Non-Security Application Developers compared to IT Admins. There are no third-party licensing restrictions to use our 90 data sanitization engines, also known as Content Disarm and Reconstruction (CDR), and Vulnerability Engine. Anti-malware engine availability differs in our multi-scanning packages depending on the intended use case:

OPSWAT Announces New Japanese Website

OPSWAT is excited to announce the release of our Japanese website, offering localized content about our Metadefender threat prevention and detection platform.

read more

New Vendors Appear in Top 3 Rankings in OPSWAT’s Windows Anti-malware Market Share Report

OPSWAT releases first monthly Windows Anti-malware Market Share Report, covering market share statistics for anti-malware vendors and products.

read more

Advanced Macro Malware that Evades Sandboxes is Stopped by Data Sanitization (CDR)

Recently, McAfee Labs published a report describing advancements in macro-based malware that uses new techniques to evade detection. This malware avoids many of the markers that anti-malware products look for to detect malicious macros. One of these common markers are macros that launch on the document’s AutoOpen() or DocumentOpen() events. These macros also do some sophisticated checks to determine whether they are likely being executed inside of a sandboxed environment. If there is anything in the environment that suggests the file is being accessed inside of a sandbox, the malware does nothing in an attempt to evade detection.

read more

Event Wrap Up: OPSWAT Symposium for Cybersecurity Experts & Developers

Thank you to everyone who attended and took part in another successful event, the OPSWAT Symposium for Cybersecurity Experts & Developers in Santa Clara, CA. Along with our partners, VMRay, ARA Networks, RSA and InQuest, we held a half-day seminar to demonstrate the latest features of our technologies and how they can be integrated with other solutions to fit your data flow and device security needs. 

read more