網際網路與軟體 |客戶案例
OPSWAT 文章
訂閱 OPSWAT 電子報
獲取最新的OPSWAT 公司更新以及
活動資訊以及推動
行業前進。
在OPSWAT的全球體驗實驗室之一探索關鍵基礎設施保護
產業洞察
閱讀推動網路安全世界的熱門故事。
Apr2,2026| 檔案安全性
Zombie ZIP (CVE-2026-0866): How a Malformed Archive Header Is Bypassing 98% of Security Scanners
Ask most security teams how they handle incoming ZIP files and you’ll hear the same answer: “We scan them.” What they mean is that their anti-malware or EDR solution reads the archive’s header, extracts the contents, and scans for known threats. The problem is that most scanning engines trust what an archive declares about itself. Attackers have known how to exploit that assumption for years.
Mar 25, 2026 | Industry News
From Privilege Escalation to Full Denial of Service: Exploit Chain Across Multiple CVEs in Cisco Catalyst Devices Discovered by OPSWAT Unit 515
Cisco Catalyst switches sit at the heart of enterprise networks, where the management plane is both a high-value target and a single point of operational failure. During proactive research in the OPSWAT Critical Infrastructure Protection (CIP) Lab, OPSWAT Unit 515 identified four vulnerabilities affecting Cisco Catalyst 9300 Series switches.
2026年3月16日 |Cloud
隨著各組織Secure 列為優先事項OPSWAT企業資料保護業務蓬勃發展
隨著雲端與本地儲存市場蓬勃發展,源自檔案的風險日益增加,促使企業廣泛採用MetaDefender Security™
Apr2,2026| 關鍵網路安全
Breaking the Attack Chain
How Diodes Could Have Changed the Outcome of the 2025
Attack on Poland’s Energy Infrastructure
2025 年 7 月 21 日 |Email Security
高可用性和可擴充性如何讓Email Security 更具彈性
OPSWAT MetaDefender Email Gateway Security 6.1.0
Apr2,2026| 檔案安全性
Zombie ZIP (CVE-2026-0866): How a Malformed Archive Header Is Bypassing 98% of Security Scanners
Ask most security teams how they handle incoming ZIP files and you’ll hear the same answer: “We scan them.” What they mean is that their anti-malware or EDR solution reads the archive’s header, extracts the contents, and scans for known threats. The problem is that most scanning engines trust what an archive declares about itself. Attackers have known how to exploit that assumption for years.
2025 年 8 月 8 日 | 惡意軟體分析
零時差偵測:如何識別和預防攻擊
零天漏洞是指開發者或供應商不知道的軟體或硬體缺陷。由於沒有修補程式或修復方法,攻擊者可以立即利用它,也就是說有零時差的漏洞,而事先沒有警告或防禦。
2026年3月4日 | 原廠設備製造商
OESIS 框架發布公告 | 2026年3月
我們非常興奮地宣布,本月將為OESIS框架推出最新更新。準備好透過擴展對更多產品的支持以及一些令人振奮的新功能,為您的端點防護解決方案注入強大動力。
Apr2,2026|供應鏈安全
EU Cyber Resilience Act (CRA): A Roadmap to Software Supply Chain and SBOM Compliance
The European Union has significantly elevated its cybersecurity posture with the adoption of Regulation (EU) 2024/2847, also known as the CRA (Cyber Resilience Act). As the first horizontal cybersecurity regulation for PDEs (products with digital elements), the CRA establishes legally binding security requirements for both hardware and software placed on the EU market.
Mar 30, 2026 | Threat Intelligence
Behavior-Centric Threat Intelligence for Zero-Day Detection
How the Threat Intelligence Engine Powers MetaDefender Aether for Core
類別
在OPSWAT的全球體驗實驗室之一探索關鍵基礎設施保護
OPSWAT 新聞
探索最新的OPSWAT 事件和成就,包括產品發佈、活動和文化更新。

