Introducing OPSWAT Threat Intelligence Similarity Search Learn More

Blog Tag: Multi-Scanning

Top 5 Ways to Keep Email Inboxes Secure

January 19, 2023
Close to 20% of organizational data breaches in 2022 are caused by phishing attacks, per Verizon. The same report also pointed out the fact that email remains...

How to Protect Against Software Supply Chain Attacks

October 04, 2018 by Taeil Goh
What protections do you have in place to ensure that your software builds are virus-free before releasing to the public? With software supply chain attacks on...

Fake Android Apps Containing Coinhive Miner Identified by Metadefender Cloud

January 10, 2018
Waqas Amir of HackRead reported on fake Android applications that infect devices with Monero-mining Coinhive earlier this week. Coinhive is a cryptocurrency...

How to Integrate Multiple Antivirus APIs

December 20, 2017 by Yiyi Miao
Protecting files, systems, and data against malware attacks requires ever more sophisticated anti-malware solutions as attacks increase in volume and...

How to Defend Against Malware Outbreaks with Secure File Transfer

October 05, 2017
Threats may be present in any file. This is a given, and cyber security defense strategies must take this into account. This is why secure file transfer...

For more information, please contact one of our critical infrastructure cybersecurity experts.