Deep CDR

Protecting against malicious files with embedded content

Preventing Evasion Techniques in Excel Files with Deep CDR

January 19, 2023
Malware is ever-evolving, and so are malware evasion techniques. In a study conducted by the University of Genoa which analyzes 180,000 Windows malware...

Set Boundaries - How a Single Platform Secures Enterprise Networks with Zero Trust

September 01, 2022
In spite of advances in cybersecurity, malicious attacks are still becoming more prevalent than ever. Vulnerabilities have been leveraged as leading weapons in...

What to do about Visual Studio Tools for Office (VSTO) - An alternative to VBA used by cybercriminals

July 27, 2022 by Vinh Lam, Senior Technical Program Manager
VBA (Visual Basic for Applications) macros in Microsoft Office documents have long been abused by threat authors to gain entry to a target system and deploy...

How Do You Treat Email Attachments?

June 16, 2022 by Janos Rotzik
New Email Campaign Using PDF Has Been Discovered...

How To Protect Your Network from the New Emotet Attack Abusing LNK File

June 09, 2022 by Ngoc Nguyen
Emotet is considered the most common as well as the most destructive and costly-to-remediate malware currently (1). It primarily spreads through phishing...

Is there anything you can do about Follina?

June 02, 2022 by Vinh Lam, Senior Technical Program Manager
Microsoft Office Zero-Day Vulnerability Abused To Execute PowerShell...

BazarBackdoor malware infection using CSV text files – How to prevent it

April 14, 2022 by Ngoc Nguyen
In Feb 2022, malware researcher Chris Campbell spotted a new phishing campaign using specially crafted CSV (comma-separated values) text files to infect users'...

For more information, please contact one of our cybersecurity experts.

Sign up for Blog updates!
Get information and insight from the leader in advanced threat prevention.