Resource Center

Knowledge Base

A Complete Guide to Content Disarm and Reconstruction (CDR) Technology

Have you ever heard of Content Disarm and Reconstruction, Content Disarm and Reconstruct, or CDR? If you have, you might recognize these are are all terms used for a technology that can eliminate all file-borne threats. Keep reading as we provide an overview of what CDR is, how it’s used, the history and evolution of...
White Papers
Featured Resource

How to Best Protect Your Enterprise Email from File-Borne Attacks

Many common cybersecurity technologies are powerless in an environment where undisclosed and zero-day attacks abound. With cybercriminals becoming more sophisticated than ever and investing enormous effort in preparing successful targeted attacks through email, a revolutionary approach to cyber protection is required. Download the eBook to learn more. 
White Papers
Featured Resource

Malicious Macros: The Holes in Microsoft Software That Hackers Hope You Don’t Know About

A macro is a mini program that is designed to automate a task within a larger program in order to make the user experience faster and easier. Macros are a legitimate and important component of any productivity software, including common Microsoft Office software for creating documents, spreadsheets, and presentations. Unfortunately, these efficiency-drivers are easily compromised...
White Papers
Featured Resource

How to Plug the Gaps Found in Antivirus, Next-Gen Antivirus and Sandbox File Security

Many organizations believe that utilizing antivirus (AV), next-gen antivirus (NGAV), and sandbox security technologies is the best practice for file security. While these technologies are certainly important for threat prevention, each has its own vulnerabilities that can be exploited by malicious hackers seeking a way to disrupt business activity and make quick money. This eBook...
Webinars
Featured Resource

What’s in that Malicious File? A File Dissection Event

Organizations receive malicious files from emails, web uploads, and content-sharing platforms daily. File-borne attacks are on the rise and 40%-60% of malicious files evade and breach existing security defenses to end up in your inboxes, on your platforms, and in your network. We want you to send us those files. Seriously. Forward malicious files to...
Case Studies
Featured Resource

How FedEx, UPS & DHL Customers were Tricked by Advanced Phishing

Just a few months ago, Votiro discovered a cleverly disguised, multi-stage phishing campaign targeting UPS, FedEx, and DHL customers. Download the case study, How FedEx, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign to view the emails and Excel attachments from the phishing campaign. The case study also covers: What made these...
Brochures
Featured Resource

Votiro Cloud for Web Applications API

Document upload threats can come from anywhere. Whether it’s contracts, claims or applications, accepting uploaded files from the web is necessary for your business to run. But there’s no telling where these files came from, or what threats could be hiding inside them. Today’s detection-based tools simply aren’t designed to catch every threat, which means...
Brochures
Featured Resource

Votiro Cloud for Email API

Emails are the most popular target for malicious attacks. Email is so essential to work, most employees use it without thinking. Hackers easily exploit this by targeting individuals in your company with weaponized files they least suspect. And because current solutions aren’t designed to catch every threat, we’re always one click away from disaster. Download...
Brochures
Featured Resource

Votiro Cloud

Votiro Cloud is the only solution that guarantees complete protection from weaponized files. Unlike detection-based file security solutions that scan for suspicious elements and block some malicious files, Votiro’s revolutionary Positive Selection technology™ singles out only the safe elements of each file, ensuring every file that enters your organization is 100% safe. Votiro’s new approach...
Webinars
Featured Resource

How a Phishing Campaign Tricked Shipping Customers

Just a few months ago, Votiro discovered a cleverly disguised, multi-stage phishing campaign targeted UPS, FedEx, and DHL customers. In the webinar How FedEx, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign, Votiro Director of Engineering, Rich Hosgood, dissects the UPS, FedEx, and DHL emails and Excel Attachments and explains: What made...
Knowledge Base
Featured Resource

SANDBOX EVASION USING VBA REFERENCING

The sandbox, last line of defense for many networks, isn’t what it used to be. Watch Votiro’s researcher, Amit Dori, shows how attackers can bypass sandbox security, inserting malicious code on servers without getting flagged, by taking advantage of basic rules of how VBA (Visual Basic for Applications) macros and sandboxes operate. If once a...