Skip Navigation

Ryuk ransomware presents a serious threat to enterprises and government organizations everywhere. Consequences of a ransomware attack are significant. No enterprise or governmental organization is immune. CISOs and IT administrators can take some key steps to protect important systems and networks, such as putting protocols in place to limit damage, deploying technical solutions— such as Positive Selection technology – to filter email files, email attachments, and other incoming files, and ensuring all data is properly backed up. With Ryuk malware, the absolute best protection is prevention.

Download Now

A macro is a mini program that is designed to automate a task within a larger program in order to make the user experience faster and easier. Macros are a legitimate and important component of any productivity software, including common Microsoft Office software for creating documents, spreadsheets, and presentations.  Macros for Microsoft Office are currently written in Visual Basic for Applications (VBA) and work within most Office programs for both Windows and Macintosh, including Word, Excel, Outlook, PowerPoint, Project, Access, Publisher, and Visio. Unfortunately, these efficiency-drivers are easily compromised by hackers. Cybercriminals have figured out that by hiding their malicious code inside Office macros, they  have a good chance of tricking a victim into triggering.

Download Now

Many organizations believe that utilizing antivirus (AV), next-gen antivirus (NGAV), and sandbox security technologies is the best practice for file security.  


While these technologies are certainly important for threat  prevention, each has its own vulnera-bilities that can be exploited by malicious hackers seeking a way to disrupt business activity and make quick money.  


This eBook explores these security techniques, identifies the gaps in each, and explains how a particular technology – Positive Selection technology – can fill those gaps and ensure your files are safe.

Download Now

Many common cybersecurity technologies are powerless in an environment where undisclosed and zero-day attacks abound. With cybercriminals becoming more sophisticated than ever and investing enormous effort in preparing successful targeted attacks through email, a revolutionary approach to cyber protection is required.

Positive Selection technology provides the ultimate solution for stopping undisclosed and zero-day email-based threats by singling out only the safe elements of each file, ensuring every file that enters your organization is 100% safe.

Download Now

File-borne attacks are on the rise, and 80% of successful breaches are new, unknown, or zero-day attacks that are not recognized by traditional signature-based detection solutions, such as antivirus. An example of this is an April 2020 attack that delivered Dridex ransomware to FedEx, UPS, and DHL customers. Sophisticated phishing emails—cleverly disguised to appear to be from company email accounts were sent with legitimate-looking attachments that delivered the payload. This threat's signature was not recognized in antivirus databases for 2 entire days, leaving the business' vulnerable.

In the past, detection and alert-based security tools were best-in-class. But in a world of zero-days and an overwhelming amount of attacks, these solutions miss massive quantities of threats—as much as 40%—leaving security teams fighting both alert fatigue and new threats from all fronts.

In this talk, Brent Hansen, Thales TCT's CTO, and Richard Hosgood, white hat hacker and North American Director of Engineering at file security company, Votiro, dissects the April 2020 phishing attack, the gaps that antivirus and next-generation antivirus leave for unknown and zero-day threats, and how an emerging technology called Positive Selection technology can prevent these types of attacks.

Download Now

Secure all file uploads and receive documents completely risk-free.

Download Now

Completely secure every email that enters your organization.

Download Now

This site uses cookies to store information on your computer. Some are essential to make our site work properly; others help us improve the user experience.

By using the site, you consent to the placement of these cookies. For more information, read our cookie policy and our privacy policy.

Accept