Researchers identified a Microsoft Word document-based attack that does not use macros and has multiple stages. OPSWAT data sanitization disarms this attack.
Last winter, OPSWAT CEO and Founder Benny Czarny spoke on the subject of data sanitization, or Content Disarm and Reconstruction, at SF State University.
We chose CVE-2017-3157 to demonstrate how OPSWAT data sanitization, or CDR, prevents vulnerability exploits for OpenOffice and LibreOffice.
To help keep OpenOffice and LibreOffice users secure, OPSWAT data sanitization (CDR) now supports OpenDocument Text files (ODT).
We discovered and sanitized a malicious DDE Word document from threat group APT28, a.k.a. Fancy Bear. Data sanitization was able to remove the DDE code.
A new Ursnif-related spear phishing attack takes social engineering deception to a new level. Why is CDR the best way to combat this banking Trojan?
Attacks using the DDE feature of Microsoft Word are on the rise. Such attacks do not use macros and can evade many anti-malware defenses.
Our CEO and founder, Benny Czarny, will speak at San Francisco State University's CS Graduate Seminar on October 18th. Don't miss this special event!
Threats may be present in any file, and cyber security strategies must take this into account. This is why secure file transfer solutions are essential.
On September 21st, OPSWAT and Upwork hosted a joint webinar about advanced threat prevention with data sanitization (Content Disarm and Reconstruction).