Researchers identified a Microsoft Word document-based attack that does not use macros and has multiple stages. OPSWAT data sanitization disarms this attack.
Last winter, OPSWAT CEO and Founder Benny Czarny spoke on the subject of data sanitization, or Content Disarm and Reconstruction, at SF State University.
We chose CVE-2017-3157 to demonstrate how OPSWAT data sanitization, or CDR, prevents vulnerability exploits for OpenOffice and LibreOffice.
Internet of Things (IoT) cyber attacks are on the rise. How can organizations stop advanced persistent threats targeting IoT devices?
To help keep OpenOffice and LibreOffice users secure, OPSWAT data sanitization (CDR) now supports OpenDocument Text files (ODT).
We discovered and sanitized a malicious DDE Word document from threat group APT28, a.k.a. Fancy Bear. Data sanitization was able to remove the DDE code.
A new Ursnif-related spear phishing attack takes social engineering deception to a new level. Why is CDR the best way to combat this banking Trojan?
Attacks using the DDE feature of Microsoft Word are on the rise. Such attacks do not use macros and can evade many anti-malware defenses.
FormBook malware is targeting South Korea and the U.S. and spreads via malicious email attachments, including malicious PDF, Word, and archive files.
Our CEO and founder, Benny Czarny, will speak at San Francisco State University's CS Graduate Seminar on October 18th. Don't miss this special event!