脆弱性

log4j Vulnerability Update

December 12, 2021 by Dan Lanir
On Friday, December 10, 2021 we, along with the rest of the tech community, received news of active exploitation of a previously unknown zero-day vulnerability (CVE-2021-44228) in a common component of java-based software, referred to as...

Cybersecurity Awareness Month 2021 and Protecting Critical Infrastructure

October 27, 2021
“Cyber threats can affect every American, every business regardless of size, and every community.” - Statement by President Joe Biden on Cybersecurity Awareness Month

How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)

January 14, 2021
Background In November, VMware disclosed a flaw in VMWare WorkSpace ONE Access (formerly known as VMware Identity Manger). The vulnerability is tracked as CVE-2020-4006. The NSA has warned that Russian state-sponsored hackers have been...

Use Next Gen Patch Management Technology to Enhance Cybersecurity Protection

October 05, 2020
It is common knowledge that more than 60% of all reported breaches in 2019 were due to unpatched vulnerabilities even though fixes were available. The delta between patch availability and deployment remains dangerously high which creates a...

Can A Video File Contain A Virus?

September 17, 2020
Video files are not typically thought of as potentially malicious or infected file types, but it is possible for malware to be embedded in or disguised as a video file. Due to this common misconception, audio and video files are...

Using OPSWAT to Manage Confidentiality for your Zoom Meetings

May 18, 2020
Author: Khanh Nguyen Yen, Software Engineer II, OPSWAT Background There are many organizations and individuals that create their own encryption schemes. While there are security advantages to using a custom scheme, the disadvantages are...

Defending Against COVID-19 Related Cyberattacks

April 02, 2020 by Alin Ghitulan
In difficult times, when the world experiences major disruptions like a pandemic, people become irrational, at many times acting out of fear rather than their true feelings and beliefs. Fear of misinformation, lack of resources, unprepared...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.