Deep CDR

How Do You Treat Email Attachments?

June 16, 2022 by Janos Rotzik
New Email Campaign Using PDF Has Been Discovered...

How To Protect Your Network from the New Emotet Attack Abusing LNK File

June 09, 2022 by Ngoc Nguyen
Emotet is considered the most common as well as the most destructive and costly-to-remediate malware currently (1). It primarily spreads through phishing...

ゼロデイ脆弱性 Follina についてできること

June 02, 2022
Microsoft Office のゼロデイ脆弱性を悪用し PowerShell を実行...

BazarBackdoor malware infection using CSV text files – How to prevent it

April 14, 2022 by Ngoc Nguyen
In Feb 2022, malware researcher Chris Campbell spotted a new phishing campaign using specially crafted CSV (comma-separated values) text files to infect users'...

A10 x OPSWATウェビナーのお知らせ

March 30, 2022
行政手続きオンライン化でやりとりされるファイルの検査と無害化 ~自治体DXで重要となるファイルセキュリティ...

Event Wrap-Up: GISEC 2022 in Dubai

March 24, 2022
This year, the most influential cybersecurity event in the Middle East and Africa, GISEC, was held at the Dubai World Trade Centre from March 21-March 23, 2022....

Hancitor’s Use Of Cobalt Strike Attack – Can You Prevent It?

January 14, 2022 by Ngoc Nguyen
In July 2021, there was a sophisticated cyber intrusion utilizing a link to Google’s Feed Proxy service to download a harmful Microsoft Word file to the...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.