The sandbox, last line of defense for many networks, isn’t what it used to be. Watch Votiro’s researcher, Amit Dori, shows how attackers can bypass sandbox security, inserting malicious code on servers without getting flagged, by taking advantage of basic rules of how VBA (Visual Basic for Applications) macros and sandboxes operate. If once a...
What is a Secure Email Gateway? Your Complete Guide
This article will focus on Secure Email Gateways, explaining the benefits of this technology as well as raising awareness about its drawbacks. With 3.9 billion global email users in 2019 – and that number projected to rise to 4.48 billion by 2024 – email has become the channel of choice for hackers seeking to carry...
What is Content Disarm and Reconstruction (CDR)? Everything You Need to Know
Content Disarm and Reconstruction, Content Disarm and Reconstruct, and CDR are all terms used for a technology that can eliminate all file-borne threats. In this article, we provide an overview of what CDR is, how it’s used, the history and evolution of the technology, its pros and cons, and how a new technology—Positive Selection technology—takes...