CLOSEX

Advanced Threat Prevention

Security Methods that Detect, Analyze, and Prevent Threats from Malware

Block Phishing Content with Proactive DLP

August 20, 2021 by Vinh Lam, Senior Software Architect
With built-in OCR, Proactive DLP can block phishing documents and flag personally identifiable information (PII) in images and non-searchable PDFs files.

OPSWAT | Cloud Security for Salesforce Major Update for File Protection

June 17, 2021
OPSWAT Cloud Security for Salesforce is a cloud-based security solution designed to complement the native security capabilities of the Salesforce platform.

New White Paper - Growing Risks Make Financial Services Organizations Ripe for Advanced Cybersecurity Threat Protection

May 26, 2021
Many financial services firms have embarked on digital transformation and cloud-computing adoption to increase productivity and enhance customer experience

Critical Infrastructure Protection – Lessons Learned from the Colonial Pipeline Attack

May 14, 2021 by Itay Bochner, Director of Malware Analysis Solutions
The SolarWinds and Colonial Pipeline attacks both prove that organizations and governments need to strengthen their critical infrastructure protection.

MetaDefender Prevents Emotet - The World’s Most Dangerous Malware

February 24, 2021 by Ngoc Nguyen
What is Emotet? Why is it dangerous? Emotet is an extraordinarily advanced and destructive family of malware, with the capability of escaping detection, dropping malware onto victims’ computer, and spreading to other connected devices....

Protecting Critical Infrastructure from Advanced Cyberattacks

December 30, 2020
The frequency and severity of targeted cyberattacks from organizations around the world continue to increase. The latest example is the SolarWinds hack which targeted multiple government and private organizations. While experts are still...

Emotet – From Banking Trojan to the Largest Botnet

November 19, 2020
Author: Itay Bochner Summary Emotet’s name has appeared in the news quite often recently after a long period under the radar, especially in the context of widespread ransomware attacks and advanced phishing campaigns. It is an advanced...

For more information, please contact one of our critical infrastructure cybersecurity experts.

Sign up for Blog updates
Get information and insight from the leaders in advanced threat prevention.