INSIDE TALK – The GateScanner Blog
HOME » Blog

Avoiding Adrozek and other browser-modifier malware
Microsoft Security Research Team has recently reported (December 10) that a browser modifier malware they have named Adrozek has been widely observed in recent months. This malware affects multiple browsers, including Chrome, Edge, Firefox and Yandex Browser. The mechanism of attack is modifying browser settings and DLL files to result in injection of unauthorized ads

Emotet Campaign
Emotet Campaign – Guidance to GateScanner Users Emotet, one of the most famous and dangerous Trojans, has lately been spotted as a part of a mass phishing campaign. The campaign consists of an email which includes a Microsoft Office doc that when clicked gives an Office 365 error message, generated by an obfuscated macro script. The

Tackling Qbot and preventing ransomware attacks
The infamous Qbot banking trojan has recently been spotted again, infecting tens of thousands of machines to date, mainly in the US Also known as Quakbot, QakBot and Pinkslipbot, the Qbot trojan is a highly-maintained malware, with sophisticated evasion and persistence capabilities, and equipped with a worm-like functionality enabling it to spread quickly through networks.

Inside the Garmin cyberattack – Anatomy of the WastedLocker ransomware
Cyberattacks can be personal. Last Thursday, July 23rd, Garmin experienced a massive WastedLocker ransomware attack.
Read about what went behind the scenes.

Sasa Software named “Cool Vendor” by Gartner
Sasa Software named “Cool Vendor” by Gartner, in Cyber-Physical Systems (CPS) Security report 2020. Analyst firm Gartner recently published the “Cool Vendors in Cyber-Physical Systems Security” (CPS) [1] naming Sasa Software in the report. This adds to a previous publication, “Market Guide for Operational Technology Security” [2], identifying Sasa Software in the OT Endpoints Security

GDPR stand aside — meet CCPA!
The interactions between CCPA compliance and Security solutions
Effective Jan 2020, CCPA has implications beyond GDPR.
Do your security solutions support the legislation?

Sasa Software Named multiple Winner of 2020 CDM InfoSec Awards
Sasa Software Wins “Content Disarm and Reconstruction (CDR)” AND “OT/ICS Security” awards announced at the 8th Annual CDM InfoSec Awards at #RSAC 2020

Announcing GateScanner Security Dome: Multi-route Content Disarm and Reconstruction as a Service (CDRaaS)
Launched at #RSAC 2020! GateScanner Security Dome protects multiple content delivery routes, all in one solution,
leveraging GateScanner® CDR to protect against weaponized content that has never been seen before.

Sasa Software has partnered with MedOne to provide global Cloud Services
Together, we are offering GateScanner® Content Disarm and Reconstruction (CDR) solutions as a Service (CDRaaS = CDR as a Service), leveraging MedOne’s Next Generation cloud infrastructures for the highest level of performance, availability, and security.

Sasa Software Recognized as a Sample Vendor in the Gartner Hype Cycle for Threat-Facing Technologies, 2019
Gartner, the world’s leading research and advisory company, recently published the Hype Cycle for Threat-Facing Technologies, 2019, identifying Content Disarm and Reconstruction (CDR) on the Peak of Innovation phase of the Hype Cycle.

Portable Media (USB) and NERC CIP Compliance
Industrial systems are under continuous threats- according to a recent study, Half of industrial control system networks have faced cyberattacks in the past year, and removable media (portable media) is identified as the second most common threats to these networks. The cyber threats emanating from USB devices are well documented…

Caution: Can you trust external senders?
The CDR solution will then be able to open the encrypted file and handle its security In recent years, email has been increasingly used by hackers to initiate cyber-attacks. Email Attachments, unsecure links or phishing attacks provide hackers easy access to organizations. According to the Verizon Data Breach Investigation report (DBIR), nearly 50%* of APTs

GateScanner CDR Mail – Password Protected Attachments
In this video we’ll discuss a how GateScanner Mail CDR processes password protected attachments. Adding a password to files encrypts them, creating a challenge to scanning and detection technologies and opening a route of attack. GateScanner Mail CDR solves this with a unique capability for the user to securely provide the password for the file.

DICOM (Digital Imaging and Communications in Medicine) is a ticking bomb in healthcare – updated for the COVID-19 pandemic
Updated in view of the COVID-19 pandemic (Feb-Mar 2020) Medical imaging results saved in DICOM files is emerging to be an acute healthcare vulnerability. Patients continually undergo medical imaging tests, but during the COVID-19 pandemic there is a requirement to limit patient access to clinics. Furthermore, once a patient undergoes the evaluation, there are scenarios

Sasa Software Global training week, Aug 5-8th ’19
Thanks to our world-wide channel partners for visiting us for our hands-on training last week. It was exciting to host international partners from the US, Singapore, Taiwan and Vietnam.

Israeli Cyber researchers demonstrate hacking of Siemens Simatic S7 ICS controller
Israeli Cyber researchers demonstrate hacking of Siemens Simatic S7 ICS controller.The vulnerability joins a stream of attacks against infrastructure and utilities, including the “LookBack” State-Nation sponsored malware attack, using a weaponized document to install a remote access Trojan (RAT) to potentially gain control of ICS networks.

GateScanner CDR – Prevention of Stenography attacks
In this session, we review how GateScanner Content Disarm and Reconstruction (CDR) prevents steganography (“stego”) attacks – hiding malware inside of files, and how GS CDR leverages NextGeneration AVs to detect and prevent the attacks.

Sasa APAC in Tech in Gov Canberra, Aug 6-7th ’19
We are excited to announce launching our activities in Australia. Sasa APAC just kicked-off activities at the Tech in Gov conference in Canberra. Want to meet us? Contact us – We’re routinely visiting our Aussie customers and partners.
Sasa Software’s GateScanner successfully blocks ransomware attacks on Assuta Medical Centers
Sasa Software’s GateScanner solution successfully blocks ransomware attacks on Assuta Medical Centers March 1, 2017 Sasa Software’s security solutions, designed for the medical sector, have successfully prevented attacks on the Assuta hospital network. Among other things, sophisticated and unrecognized ransomware attacks were successfully blocked. Assuta – Medical Centers, the largest network of hospitals and medical

Avoiding Adrozek and other browser-modifier malware
Microsoft Security Research Team has recently reported (December 10) that a browser modifier malware they have named Adrozek has been widely observed in recent months. This malware affects multiple browsers, including Chrome, Edge, Firefox and Yandex Browser. The mechanism of attack is modifying browser settings and DLL files to result in injection of unauthorized ads

Emotet Campaign
Emotet Campaign – Guidance to GateScanner Users Emotet, one of the most famous and dangerous Trojans, has lately been spotted as a part of a mass phishing campaign. The campaign consists of an email which includes a Microsoft Office doc that when clicked gives an Office 365 error message, generated by an obfuscated macro script. The

Tackling Qbot and preventing ransomware attacks
The infamous Qbot banking trojan has recently been spotted again, infecting tens of thousands of machines to date, mainly in the US Also known as Quakbot, QakBot and Pinkslipbot, the Qbot trojan is a highly-maintained malware, with sophisticated evasion and persistence capabilities, and equipped with a worm-like functionality enabling it to spread quickly through networks.

Inside the Garmin cyberattack – Anatomy of the WastedLocker ransomware
Cyberattacks can be personal. Last Thursday, July 23rd, Garmin experienced a massive WastedLocker ransomware attack.
Read about what went behind the scenes.

Sasa Software named “Cool Vendor” by Gartner
Sasa Software named “Cool Vendor” by Gartner, in Cyber-Physical Systems (CPS) Security report 2020. Analyst firm Gartner recently published the “Cool Vendors in Cyber-Physical Systems Security” (CPS) [1] naming Sasa Software in the report. This adds to a previous publication, “Market Guide for Operational Technology Security” [2], identifying Sasa Software in the OT Endpoints Security

GDPR stand aside — meet CCPA!
The interactions between CCPA compliance and Security solutions
Effective Jan 2020, CCPA has implications beyond GDPR.
Do your security solutions support the legislation?

Sasa Software Named multiple Winner of 2020 CDM InfoSec Awards
Sasa Software Wins “Content Disarm and Reconstruction (CDR)” AND “OT/ICS Security” awards announced at the 8th Annual CDM InfoSec Awards at #RSAC 2020

Announcing GateScanner Security Dome: Multi-route Content Disarm and Reconstruction as a Service (CDRaaS)
Launched at #RSAC 2020! GateScanner Security Dome protects multiple content delivery routes, all in one solution,
leveraging GateScanner® CDR to protect against weaponized content that has never been seen before.

Sasa Software has partnered with MedOne to provide global Cloud Services
Together, we are offering GateScanner® Content Disarm and Reconstruction (CDR) solutions as a Service (CDRaaS = CDR as a Service), leveraging MedOne’s Next Generation cloud infrastructures for the highest level of performance, availability, and security.

Sasa Software Recognized as a Sample Vendor in the Gartner Hype Cycle for Threat-Facing Technologies, 2019
Gartner, the world’s leading research and advisory company, recently published the Hype Cycle for Threat-Facing Technologies, 2019, identifying Content Disarm and Reconstruction (CDR) on the Peak of Innovation phase of the Hype Cycle.

Portable Media (USB) and NERC CIP Compliance
Industrial systems are under continuous threats- according to a recent study, Half of industrial control system networks have faced cyberattacks in the past year, and removable media (portable media) is identified as the second most common threats to these networks. The cyber threats emanating from USB devices are well documented…

Caution: Can you trust external senders?
The CDR solution will then be able to open the encrypted file and handle its security In recent years, email has been increasingly used by hackers to initiate cyber-attacks. Email Attachments, unsecure links or phishing attacks provide hackers easy access to organizations. According to the Verizon Data Breach Investigation report (DBIR), nearly 50%* of APTs

GateScanner CDR Mail – Password Protected Attachments
In this video we’ll discuss a how GateScanner Mail CDR processes password protected attachments. Adding a password to files encrypts them, creating a challenge to scanning and detection technologies and opening a route of attack. GateScanner Mail CDR solves this with a unique capability for the user to securely provide the password for the file.

DICOM (Digital Imaging and Communications in Medicine) is a ticking bomb in healthcare – updated for the COVID-19 pandemic
Updated in view of the COVID-19 pandemic (Feb-Mar 2020) Medical imaging results saved in DICOM files is emerging to be an acute healthcare vulnerability. Patients continually undergo medical imaging tests, but during the COVID-19 pandemic there is a requirement to limit patient access to clinics. Furthermore, once a patient undergoes the evaluation, there are scenarios

Sasa Software Global training week, Aug 5-8th ’19
Thanks to our world-wide channel partners for visiting us for our hands-on training last week. It was exciting to host international partners from the US, Singapore, Taiwan and Vietnam.

Israeli Cyber researchers demonstrate hacking of Siemens Simatic S7 ICS controller
Israeli Cyber researchers demonstrate hacking of Siemens Simatic S7 ICS controller.The vulnerability joins a stream of attacks against infrastructure and utilities, including the “LookBack” State-Nation sponsored malware attack, using a weaponized document to install a remote access Trojan (RAT) to potentially gain control of ICS networks.

GateScanner CDR – Prevention of Stenography attacks
In this session, we review how GateScanner Content Disarm and Reconstruction (CDR) prevents steganography (“stego”) attacks – hiding malware inside of files, and how GS CDR leverages NextGeneration AVs to detect and prevent the attacks.

Sasa APAC in Tech in Gov Canberra, Aug 6-7th ’19
We are excited to announce launching our activities in Australia. Sasa APAC just kicked-off activities at the Tech in Gov conference in Canberra. Want to meet us? Contact us – We’re routinely visiting our Aussie customers and partners.
Sasa Software’s GateScanner successfully blocks ransomware attacks on Assuta Medical Centers
Sasa Software’s GateScanner solution successfully blocks ransomware attacks on Assuta Medical Centers March 1, 2017 Sasa Software’s security solutions, designed for the medical sector, have successfully prevented attacks on the Assuta hospital network. Among other things, sophisticated and unrecognized ransomware attacks were successfully blocked. Assuta – Medical Centers, the largest network of hospitals and medical