Advanced Threat Prevention

Security Methods that Detect, Analyze, and Prevent Threats from Malware

What to do about Visual Studio Tools for Office (VSTO) - An alternative to VBA used by cybercriminals

July 27, 2022 by Vinh Lam, Senior Software Architect
VBA (Visual Basic for Applications) macros in Microsoft Office documents have long been abused by threat authors to gain entry to a target system and deploy...

How To Protect Your Network from the New Emotet Attack Abusing LNK File

June 09, 2022 by Ngoc Nguyen
Emotet is considered the most common as well as the most destructive and costly-to-remediate malware currently (1). It primarily spreads through phishing...

BazarBackdoor malware infection using CSV text files – How to prevent it

April 14, 2022 by Ngoc Nguyen
In Feb 2022, malware researcher Chris Campbell spotted a new phishing campaign using specially crafted CSV (comma-separated values) text files to infect users'...

Data Privacy Week 2022: Mitigating Threats with Proactive DLP from OPSWAT

January 28, 2022
Data Privacy Week originated as an extension of Data Protection Day in Europe and is promoted every year through the National Cybersecurity Alliance. The...

MetaDefender for Jenkins and TeamCity: Secure Your Software Builds

January 14, 2022 by Vinh Lam, Senior Software Architect
Attacks on software supply chains can dramatically expand the potential distribution of malware. For example, threat actors can insert malware into the Python...

Fighting Ransomware without Borders

December 15, 2021 by Oren T. Dvoskin
In November 2021, the U.S. Department of the Treasury announced a partnership with Israel to combat ransomware. As ransomware attackers build increasingly...

Computer Security Day 2021: 10 Tips to Protect Your Employees’ Computers and Laptops from Security Threats

November 30, 2021
When addressing cybersecurity threats, insider threats have come to the forefront and are one of the leading causes of breaches. However, an insider threat...

For more information, please contact one of our cybersecurity experts.

Sign up for Blog updates!
Get information and insight from the leader in advanced threat prevention.