
The CSP/MSP’s Challenges in 2021
Much of the challenges in 2021 are due to what happened in 2020. These five major events in 2020, discussed in brief below, impacted the way we protect M365 accounts today...
odix CEO Dr. Oren Eytan joins Jen Stone on the Security Metrics Podcast
Recently odix CEO, Dr. Oren Eytan spoke with Jen Stone (Principal Security Analyst, MCIS, CISSP, CISA, QSA) of the Security Metrics podcast to discuss his journey...
Ariana Grande, audio on play and Microsoft 365 credentials hacked in RSS feed
On March 24 the odix team found a new malware which possess a unique threat to end users. The malware, which was discovered and sanitized by FileWall...
FileWall & Microsoft 365 Defender – How to optimize security in Exchange Online with complimentary technologies
The fight against malware has become the epic battle of our generation, placing businesses of all sizes against a never-ending stream of hackers and zero-day attacks...
odix CEO Dr. Oren Eytan joins Mike Jones on the H4unt3d Hacker Podcast
On March 11, 2020, odix CEO Dr. Oren Eytan participated in a fascinating conversation with Mike Jones of the H4unt3d Hacker podcast...
Why do you need to secure the email gateway?
Email has become the lifeblood of global communication. Regardless of age or gender, nationality or economic status, anyone can access an email account and begin to engage with the world...
The rise of MSP & CSP Vulnerabilities: Storehouses for secure data
Managed & Cloud Service Providers (MSP & CSP) serve an invaluable role in operating and securing companies' digital assets...
Attackers mimic Microsoft Safelinks URLs in phishing campaign
On Feb 24 the odix team noticed a new phishing campaign which contained an HTML attachment spoofing a Microsoft login page...
interworks.cloud and odix announce FileWall Distribution Partnership
Rosh Ha’Ayin, Israel, March 1,2021: interworks.cloud & odix have officially announced that FileWall, odix’s flagship Content Disarm & Reconstruction (CDR)...
5 Ways to Improve Email Security
Protecting email platforms from malware and cyberattacks is quickly becoming the most important fight in the battle for cybersecurity. While hackers and their destructive new malware, ransomware, and social engineering...
Protecting Yourself Is Protecting Your Clients
The number one rule that MSPs and CSPs need to follow is, “Practice what you preach”. You may have done a great job by ensuring your clients’ security but what if you failed to...
FileWall™ by odix is now available through Ingram Micro’s CloudBlue Platform
Rosh Ha’ayin, Israel, Feb 18, 2021: odix, an Israel-based cybersecurity company has announced that FileWall™, its flagship security add-on to defend...
Tech & Main Podcast Blog
A few short weeks ago odix CEO, Dr. Oren Eytan was privileged to join Shaun St. Hill on the Tech & Main Podcast to speak about his journey from 18-year-old military...
odix CEO Dr. Oren Eytan has been selected a 2021 CRN Crew Chief
odix CEO Dr. Oren Eytan has been named to the 2021 list of Channel Chiefs. The prestigious CRN® Channel Chiefs list...
When Military Cybertech Goes Mainstream
For decades, cyberwarfare has threatened governments, enterprises and individuals with reckless disregard for the assets or lives they have impacted. Traditionally, cyberattacks were the domain...
Pillar Technology Partners Announces Strategic Partnership with odix
Atlanta-based cyber security experts now offering expanded cybersecurity solution...
5 Biggest Cyber-Attacks of 2020
From the recent SolarWinds hack and state sponsored attacks on covid-19 vaccine research, to the seemingly endless flow of ransomware attacks and...
Rise of international hacker networks
While many envision hackers as lone wolves or small networks of illicit players, recent data suggests state actors are increasingly taking a leading role in cyber warfare...
Cyway signs Distribution Agreement with odix in the Middle East
Dubai, UAE, Jan 25th, 2021 -- Cyway, a UAE based cybersecurity solutions provider specializing in identity-centric and cloud security, has announced that it...
Aztek Technologies licenses odix FileWall™ to protect its customers from Microsoft 365 focused ransomware threats
Aztek will deploy FileWall licenses to its customers in order to protect them from file-based email cyber attacks...
Who are the leading players in state sponsored cyber terrorism?
Who is hacking your network, and why are you being targeted? Historically, hackers operated in limited cells consisting of small-scale networks of highly trained individuals. The aim was clear: to extort businesses and VIPs for economic gain...
File based attacks in social distancing era; An Analysis and Infographic
In this week's edition of the Lady Hacker Chronicles, we conclude our saga with an end of the year finale. How to plan an Attack in the Age of Social Distance. Do you have what it takes to hack your way to the new year?
odix Year in Review
2020, more so than any time in recent memory has seen massive shifts in how and where people do business. From the near universal work from home trends to the resulting need to enhance interorganizational...
What is BadUSB and how it can impact your cyber security
In this week's edition of the Lady Hacker Chronicles, we see what it takes to set up a BadUSB attack with Social Engineering...
interworks.cloud and odix announce FileWall Distribution Partnership
Rosh Ha’Ayin, Israel, March 1,2021: interworks.cloud & odix have officially announced that FileWall, odix’s flagship Content Disarm & Reconstruction (CDR)...
FileWall™ by odix is now available through Ingram Micro’s CloudBlue Platform
Rosh Ha’ayin, Israel, Feb 18, 2021: odix, an Israel-based cybersecurity company has announced that FileWall™, its flagship security add-on to defend...
odix CEO Dr. Oren Eytan has been selected a 2021 CRN Crew Chief
odix CEO Dr. Oren Eytan has been named to the 2021 list of Channel Chiefs. The prestigious CRN® Channel Chiefs list...
Pillar Technology Partners Announces Strategic Partnership with odix
Atlanta-based cyber security experts now offering expanded cybersecurity solution...
Cyway signs Distribution Agreement with odix in the Middle East
Dubai, UAE, Jan 25th, 2021 -- Cyway, a UAE based cybersecurity solutions provider specializing in identity-centric and cloud security, has announced that it...
Aztek Technologies licenses odix FileWall™ to protect its customers from Microsoft 365 focused ransomware threats
Aztek will deploy FileWall licenses to its customers in order to protect them from file-based email cyber attacks...
odix accepted into Forbes Technology Council
Rosh Ha’ayin, Israel, Nov 5, 2020— Dr Oren Eytan, CEO of Israel-based cybersecurity leader in CDR (Content Disarm and Reconstruction) technology company...
odix launches FileWall CSP Partner Program for Microsoft Ecosystem
Rosh Ha’ayin, Israel: Oct 28, 2020, odix, the Israel based cyber security leader in CDR (Content Disarm and Reconstruction) technology, is officially announcing the launch of the FileWall Cloud Solution Provider Partner Program.
odix joins the Microsoft Intelligent Security Association (MISA) program extending FileWall ™ security logs to Microsoft Azure Sentinel
Rosh Ha’ayin, Israel: Sep 30th, odix, the Israel based cyber security leader in Enterprise CDR (Content Disarm and Reconstruction) technology, has officially joined...
odix launches FileWall (Firewall for Files) for Microsoft 365 Mail Attachments
Israel-based cybersecurity company releases FileWall for Exchange Online, available exclusively through Microsoft AppSource Rosh Haayin, Israel — September 14, 2020
The CSP/MSP’s Challenges in 2021
Much of the challenges in 2021 are due to what happened in 2020. These five major events in 2020, discussed in brief below, impacted the way we protect M365 accounts today...
odix CEO Dr. Oren Eytan joins Jen Stone on the Security Metrics Podcast
Recently odix CEO, Dr. Oren Eytan spoke with Jen Stone (Principal Security Analyst, MCIS, CISSP, CISA, QSA) of the Security Metrics podcast to discuss his journey...
FileWall & Microsoft 365 Defender – How to optimize security in Exchange Online with complimentary technologies
The fight against malware has become the epic battle of our generation, placing businesses of all sizes against a never-ending stream of hackers and zero-day attacks...
odix CEO Dr. Oren Eytan joins Mike Jones on the H4unt3d Hacker Podcast
On March 11, 2020, odix CEO Dr. Oren Eytan participated in a fascinating conversation with Mike Jones of the H4unt3d Hacker podcast...
Why do you need to secure the email gateway?
Email has become the lifeblood of global communication. Regardless of age or gender, nationality or economic status, anyone can access an email account and begin to engage with the world...
5 Ways to Improve Email Security
Protecting email platforms from malware and cyberattacks is quickly becoming the most important fight in the battle for cybersecurity. While hackers and their destructive new malware, ransomware, and social engineering...
Protecting Yourself Is Protecting Your Clients
The number one rule that MSPs and CSPs need to follow is, “Practice what you preach”. You may have done a great job by ensuring your clients’ security but what if you failed to...
Tech & Main Podcast Blog
A few short weeks ago odix CEO, Dr. Oren Eytan was privileged to join Shaun St. Hill on the Tech & Main Podcast to speak about his journey from 18-year-old military...
When Military Cybertech Goes Mainstream
For decades, cyberwarfare has threatened governments, enterprises and individuals with reckless disregard for the assets or lives they have impacted. Traditionally, cyberattacks were the domain...
5 Biggest Cyber-Attacks of 2020
From the recent SolarWinds hack and state sponsored attacks on covid-19 vaccine research, to the seemingly endless flow of ransomware attacks and...
Ariana Grande, audio on play and Microsoft 365 credentials hacked in RSS feed
On March 24 the odix team found a new malware which possess a unique threat to end users. The malware, which was discovered and sanitized by FileWall...
Attackers mimic Microsoft Safelinks URLs in phishing campaign
On Feb 24 the odix team noticed a new phishing campaign which contained an HTML attachment spoofing a Microsoft login page...
ExRobotos: Old phishing kit resurfaces with new life
Summary: On Oct 27, the odix team detected a file-based phishing malware in an email attachment that was blocked by FileWall system...
Attachment based phishing uses CAPTCHA to avoid detection
Summary: On Oct 23, the odix team detected a file-based phishing malware in an email attachment that was blocked by FileWall system. To avoid detection the blocked attachment redirected the user to a website requiring...
Attachment-based phishing campaign
Summary: On Oct 21, the odix team detected a file-based phishing malware in an email attachment that was blocked by the FileWall system.
The rise of MSP & CSP Vulnerabilities: Storehouses for secure data
Managed & Cloud Service Providers (MSP & CSP) serve an invaluable role in operating and securing companies' digital assets...
File based attacks in social distancing era; An Analysis and Infographic
In this week's edition of the Lady Hacker Chronicles, we conclude our saga with an end of the year finale. How to plan an Attack in the Age of Social Distance. Do you have what it takes to hack your way to the new year?
What is BadUSB and how it can impact your cyber security
In this week's edition of the Lady Hacker Chronicles, we see what it takes to set up a BadUSB attack with Social Engineering...
Are QR Codes Safe Today? An Analysis and Infographic
Everyone is using QR codes these days. Must be safe, right? In this week's edition of the Lady Hacker Chronicles, we see what it takes to launch a QR Scanning Attack. Will you think twice before your next scan?
What is Juice Jacking? An Analysis and Infographic
In this week's edition of the Lady Hacker Chronicles, we dive into Juice Jacking. Hope you're thirsty.
How dangerous are public wifi networks? An Analysis and Infographic
In this week's edition of the Lady Hacker Chronicles, we see what it takes to Impersonate a Public WIFI Network. happy surfing. to learn more, click below
How do DDOS attacks impact businesses? An Analysis and Infographic
In this week's edition of the Lady Hacker Chronicles, we look at the price to be paid in a DDOS attack. Gobble gobble. to learn more, read below
How easy is to create a Ransomware attack? An Analysis and Infographic
In this week's edition of the Lady Hacker Chronicles, we look at the high stakes of ransomware attacks. Would you roll the dice?
Are Spear Phishing the new generation of Phishing attacks?
our journey through the Lady Hacker Chronicles continues with chapter 2: Let's go (spear) Phishing.
Are Phishing attacks work? An Analysis and Infographic
odix is excited to invite its readers to an educational series of “The lady hacker chronicles”. The diary includes multiple chapters, each one starts with particular cyber-attack variation hackers around the world...
Find out more

Contact
us


Request a
demo


Explore
Case Studies
