What is a Sandbox in Cybersecurity?
Discover how sandboxing technology creates isolated environments to safely analyze suspicious files and detect malicious behavior before it reaches your network.
Discover how sandboxing technology creates isolated environments to safely analyze suspicious files and detect malicious behavior before it reaches your network.
Learn how content security safeguards your data and files from tampering, theft, and malicious exploitation across your network infrastructure.
Implement industry-leading best practices to strengthen your network defenses against evolving cyber threats and vulnerabilities.
Explore network isolation techniques that create secure boundaries between systems to prevent lateral movement and protect critical assets.
Learn how network segregation divides your network into isolated segments to contain breaches and minimize the impact of security incidents.
Discover how network protection safeguards your digital infrastructure against cyber threats and unauthorized access while maintaining operational efficiency.
[Updated January 2023] Recently detected activity of the CLOP ransomware gang involving the compromise and infection of medical imaging CD’s and the DICOM files within, has raised alarm due to the extremely wide exposure represented by this ubiquitous medium.Sasa Software is currently the only cybersecurity vendor offering a dedicated solution for the protection of healthcare networks …
Microsoft Security Research Team has recently reported (December 10) that a browser modifier malware they have named Adrozek has been widely observed in recent months. This malware affects multiple browsers, including Chrome, Edge, Firefox and Yandex Browser. The mechanism of attack is modifying browser settings and DLL files to result in injection of unauthorized ads …
Avoiding Adrozek and other browser-modifier malware Read More »
Tackling Qbot and preventing Ransomware Attacks The infamous Qbot banking trojan has recently been spotted again, infecting tens of thousands of machines to date, mainly in the USAlso known as Quakbot, QakBot and Pinkslipbot, the Qbot trojan is a highly-maintained malware, with sophisticated evasion and persistence capabilities, and equipped with a worm-like functionality enabling it …
Cyberattacks can be personal. Last Thursday, July 23rd, Garmin experienced a massive WastedLocker ransomware attack.
Read about what went behind the scenes.
The interactions between CCPA compliance and Security solutions
Effective Jan 2020, CCPA has implications beyond GDPR.
Do your security solutions support the legislation?
Sasa Software Wins “Content Disarm and Reconstruction (CDR)” AND “OT/ICS Security” awards announced at the 8th Annual CDM InfoSec Awards at #RSAC 2020
Launched at #RSAC 2020! GateScanner Security Dome protects multiple content delivery routes, all in one solution,
leveraging GateScanner® CDR to protect against weaponized content that has never been seen before.
Together, we are offering GateScanner® Content Disarm and Reconstruction (CDR) solutions as a Service (CDRaaS = CDR as a Service), leveraging MedOne’s Next Generation cloud infrastructures for the highest level of performance, availability, and security.
Gartner, the world’s leading research and advisory company, recently published the Hype Cycle for Threat-Facing Technologies, 2019, identifying Content Disarm and Reconstruction (CDR) on the Peak of Innovation phase of the Hype Cycle.
Industrial systems are under continuous threats- according to a recent study, Half of industrial control system networks have faced cyberattacks in the past year, and removable media (portable media) is identified as the second most common threats to these networks. The cyber threats emanating from USB devices are well documented…
The CDR solution will then be able to open the encrypted file and handle its security In recent years, email has been increasingly used by hackers to initiate cyber-attacks. Email Attachments, unsecure links or phishing attacks provide hackers easy access to organizations. According to the Verizon Data Breach Investigation report (DBIR), nearly 50%* of APTs …
In this video we’ll discuss a how GateScanner Mail CDR processes password protected attachments. Adding a password to files encrypts them, creating a challenge to scanning and detection technologies and opening a route of attack. GateScanner Mail CDR solves this with a unique capability for the user to securely provide the password for the file.
Israeli Cyber researchers demonstrate hacking of Siemens Simatic S7 ICS controller.The vulnerability joins a stream of attacks against infrastructure and utilities, including the “LookBack” State-Nation sponsored malware attack, using a weaponized document to install a remote access Trojan (RAT) to potentially gain control of ICS networks.
In this session, we review how GateScanner Content Disarm and Reconstruction (CDR) prevents steganography (“stego”) attacks – hiding malware inside of files, and how GS CDR leverages NextGeneration AVs to detect and prevent the attacks.
We are excited to announce launching our activities in Australia. Sasa APAC just kicked-off activities at the Tech in Gov conference in Canberra. Want to meet us? Contact us – We’re routinely visiting our Aussie customers and partners.