Deep CDR

Protecting against malicious files with embedded content

Understanding Deep CDR in Critical Infrastructure Protection Cybersecurity

March 09, 2021 by Dan Lanir
This blog post is part of an ongoing cybersecurity training series sponsored by OPSWAT Academy which reviews the technologies and processes required to design, implement, and manage a critical infrastructure protection program. Since...

Deep CDR prevents Advanced Maldoc Techniques - VBA Stomping

January 15, 2021 by Ngoc Nguyen
Macros remain the most popular vector for malware and payload delivery. In fact, malware authors are switching to attack methodologies that leverage MS Office and script-based threats. There was a significant increase in script-based...

BLINDINGCAN: A New Trojan Strain Abusing Microsoft Attached Document Template

September 09, 2020 by Vinh Lam
The US Federal Bureau of Investigation (FBI) and Cybersecurity and Infrastructure Security Agency (CISA) have published Malware Analysis Report (AR20-232A) warning of a new strain of malware named “BLINDINGCAN”. This is a remote access...

Automating Content Disarm and Reconstruction (CDR) Testing with OPSWAT Visual Comparison

July 30, 2020 by Nhut Ngo
OPSWAT Deep Content Disarm and Reconstruction (Deep CDR) is an advanced threat prevention technology. Unlike detection-based methods, Deep CDR is designed for eliminating all potential malicious codes from files. Each file is completely...

OPSWAT Deep CDR now supports DICOM file format

July 10, 2020 by Vinh Lam
Digital Imaging and Communications in Medicine (DICOM) is an international standard for transmitting, storing, retrieving, printing, and displaying medical imaging information, such as X-ray, CT scans,...

Preventing Evasion Techniques in Excel Files with Deep CDR

June 05, 2020 by Vinh Lam
98% of malware threats are equipped with evasion technology and becoming a real problem for cybersecurity.(1) Along with defeating signature-based and behavior-based detection tools, cybercriminals utilize many sophisticated evasion...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.