Resource Center

Knowledge Center

The Complete Guide to Content Disarm and Reconstruction (CDR)

If you’re familiar with the cybersecurity industry, you may have heard of Content Disarm and Reconstruction, also known as CDR. If so, you might recognize that this term is used to describe technology that can eliminate all file-borne threats, including novel, zero-days that haven’t been identified by antivirus (AV). In this guide, we provide an...
Webinars
Featured Resource

What’s in that Malicious File? A File Dissection Event

Organizations receive malicious files from emails, web uploads, and content-sharing platforms daily. File-borne attacks are on the rise and 40%-60% of malicious files evade and breach existing security defenses to end up in your inboxes, on your platforms, and in your network. We want you to send us those files. Seriously. Forward malicious files to...
Customer Stories
Featured Resource

How FedEx, UPS & DHL Customers were Tricked by Advanced Phishing

Just a few months ago, Votiro discovered a cleverly disguised, multi-stage phishing campaign targeting UPS, FedEx, and DHL customers. Download the case study, How FedEx, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign to view the emails and Excel attachments from the phishing campaign. The case study also covers: What made these...
Product Info
Featured Resource

Votiro Cloud for Web Applications API

Document upload threats can come from anywhere. Whether it’s contracts, claims or applications, accepting uploaded files from the web is necessary for your business to run. But there’s no telling where these files came from, or what threats could be hiding inside them. Today’s detection-based tools simply aren’t designed to catch every threat, which means...
Product Info
Featured Resource

Votiro Cloud for Email API

Emails are the most popular target for malicious attacks. Email is so essential to work, most employees use it without thinking. Hackers easily exploit this by targeting individuals in your company with weaponized files they least suspect. And because current solutions aren’t designed to catch every threat, we’re always one click away from disaster. Download...
Webinars
Featured Resource

How a Phishing Campaign Tricked Shipping Customers

Just a few months ago, Votiro discovered a cleverly disguised, multi-stage phishing campaign targeted UPS, FedEx, and DHL customers. In the webinar How FedEx, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign, Votiro Director of Engineering, Rich Hosgood, dissects the UPS, FedEx, and DHL emails and Excel Attachments and explains:
Webinars
Featured Resource

Webinar: How FedEx, UPS & DHL Customers were Tricked by an Advanced Phishing Campaign.

Knowledge Center
Featured Resource

SANDBOX EVASION USING VBA REFERENCING

The sandbox, last line of defense for many networks, isn’t what it used to be. Watch Votiro’s researcher, Amit Dori, shows how attackers can bypass sandbox security, inserting malicious code on servers without getting flagged, by taking advantage of basic rules of how VBA (Visual Basic for Applications) macros and sandboxes operate. If once a...