MetaDefender Core - New Package Efficacy Report
We are happy to introduce a new calculation method for our package efficacy report. The storage and processing of the data logs have been optimized and the formulas revised to be faster and more accurate.
We calculate a daily list of the top 10,000 most searched for infected hashes which have been detected by at least 3 of our engines. Then we average over the past 30 days and compute a new top list of hashes. The first 100 hashes can be seen in the package efficacy report.
We have also expanded our malware sources. Establishing more partnerships in the malware community has gained us access to hundreds of thousands of additional infected files on a weekly basis, which means more analyzed samples and a better comparison of engines and engine packages. Potentially malicious file types now include a wide range of MS Office files, graphics and multimedia, as well as various scripting languages and web formats.
We will continue to improve the report - next up is a UX/UI redesign to make the report easier to read and understand. We will also be adding more data points, so stay tuned!
For more information, please contact one of our cybersecurity experts.

- Academy 22
- Advanced Threat Prevention 69
- CEO's Blog 25
- Company Announcements 143
- Company Culture 15
- CVEs 285
- Deep CDR 68
- DevSecOps 3
- Email Security 32
- Engineering Blog 3
- File Upload Security 26
- Industrial Cybersecurity 26
- Kiosk & USB Security 38
- Malware Analysis 83
- OACCP Certification 46
- OESIS Framework 131
- Product Announcements 349
- Reports 28
- Secure Access 27
- Secure Data Storage 26
- Technology Partnerships 42
- Vulnerabilities 29
- File Upload Protection – 10 Best Practices for Preventing Cyber Attacks
- Protecting Critical Infrastructure from Advanced Cyberattacks
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure
- How the Energy Industry Can Survive Targeted Attacks
- Smarter Malware Analysis Starts Here
- Research Highlights Significant Challenges for Organizations in Responding to Malware Threats
- MetaDefender Prevents Emotet - The World’s Most Dangerous Malware
- OPSWAT Takes Proactive Steps to Close the Critical Infrastructure Protection Skills Gap
- Can A Video File Contain A Virus?