Introducing OPSWAT Threat Intelligence Similarity Search Learn More

Deep CDR

CVE-2023-21716: Malicious RTF File Protection with Content Disarm and Reconstruction

March 21, 2023 by Nhut Ngo, Director of Software Engineering
Microsoft recently issued a security advisory describing CVE-2023-21716, a critical Remote Code Execution (RCE) vulnerability affecting several versions of...

Create and Prevent Steganography in Five Minutes

February 10, 2023
It started with an imprisoned tyrant, a haircut, and a tattooed servant. At least, that's how Herodotus tells it....

Deep CDR で Excel に潜む検知回避技術を阻止

January 19, 2023 by Vinh Lam, Senior Technical Program Manager
マルウェア脅威の 98% は回避テクノロジーを備えており、サイバーセキュリティにとって深刻な問題になっています。(1) サイバー犯罪者は、シグネチャや挙動による検知ツールを打ち負かし、多くの高度な回避戦術を利用して検知をすり抜けます。本ブログでは、ウイルス対策ソフトウェアを回避するために、脅威アクターが使用する 2...

How Deep CDR Technology Effectively Protects Enterprise Security

September 01, 2022 by Hai Nguyen
In spite of advances in cybersecurity, malicious attacks are still becoming more prevalent than ever. Vulnerabilities have been leveraged as leading weapons in...

What to do about Visual Studio Tools for Office (VSTO) - An alternative to VBA used by cybercriminals

July 27, 2022
VBA (Visual Basic for Applications) macros in Microsoft Office documents have long been abused by threat authors to gain entry to a target system and deploy...

How Do You Treat Email Attachments?

June 16, 2022 by Janos Rotzik
New Email Campaign Using PDF Has Been Discovered...

How To Protect Your Network from the New Emotet Attack Abusing LNK File

June 09, 2022 by Ngoc Nguyen
Emotet is considered the most common as well as the most destructive and costly-to-remediate malware currently (1). It primarily spreads through phishing...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.