
The rise of MSP & CSP Vulnerabilities: Storehouses for secure data
Managed & Cloud Service Providers (MSP & CSP) serve an invaluable role in operating and securing companies' digital assets...
Attackers mimic Microsoft Safelinks URLs in phishing campaign
On Feb 24 the odix team noticed a new phishing campaign which contained an HTML attachment spoofing a Microsoft login page...
interworks.cloud and odix announce FileWall Distribution Partnership
Rosh Ha’Ayin, Israel, March 1,2021: interworks.cloud & odix have officially announced that FileWall, odix’s flagship Content Disarm & Reconstruction (CDR)...
5 Ways to Improve Email Security
Protecting email platforms from malware and cyberattacks is quickly becoming the most important fight in the battle for cybersecurity. While hackers and their destructive new malware, ransomware, and social engineering...
Protecting Yourself Is Protecting Your Clients
The number one rule that MSPs and CSPs need to follow is, “Practice what you preach”. You may have done a great job by ensuring your clients’ security but what if you failed to...
FileWall™ by odix is now available through Ingram Micro’s CloudBlue Platform
Rosh Ha’ayin, Israel, Feb 18, 2021: odix, an Israel-based cybersecurity company has announced that FileWall™, its flagship security add-on to defend...
Tech & Main Podcast Blog
A few short weeks ago odix CEO, Dr. Oren Eytan was privileged to join Shaun St. Hill on the Tech & Main Podcast to speak about his journey from 18-year-old military...
odix CEO Dr. Oren Eytan has been selected a 2021 CRN Crew Chief
odix CEO Dr. Oren Eytan has been named to the 2021 list of Channel Chiefs. The prestigious CRN® Channel Chiefs list...
When Military Cybertech Goes Mainstream
For decades, cyberwarfare has threatened governments, enterprises and individuals with reckless disregard for the assets or lives they have impacted. Traditionally, cyberattacks were the domain...
Pillar Technology Partners Announces Strategic Partnership with odix
Atlanta-based cyber security experts now offering expanded cybersecurity solution...
5 Biggest Cyber-Attacks of 2020
From the recent SolarWinds hack and state sponsored attacks on covid-19 vaccine research, to the seemingly endless flow of ransomware attacks and...
Rise of international hacker networks
While many envision hackers as lone wolves or small networks of illicit players, recent data suggests state actors are increasingly taking a leading role in cyber warfare...
Cyway signs Distribution Agreement with odix in the Middle East
Dubai, UAE, Jan 25th, 2021 -- Cyway, a UAE based cybersecurity solutions provider specializing in identity-centric and cloud security, has announced that it...
Aztek Technologies licenses odix FileWall™ to protect its customers from Microsoft 365 focused ransomware threats
Aztek will deploy FileWall licenses to its customers in order to protect them from file-based email cyber attacks...
Who are the leading players in state sponsored cyber terrorism?
Who is hacking your network, and why are you being targeted? Historically, hackers operated in limited cells consisting of small-scale networks of highly trained individuals. The aim was clear: to extort businesses and VIPs for economic gain...
The lady hacker chronicles chapter IX
In this week's edition of the Lady Hacker Chronicles, we conclude our saga with an end of the year finale. How to plan an Attack in the Age of Social Distance. Do you have what it takes to hack your way to the new year?
odix Year in Review
2020, more so than any time in recent memory has seen massive shifts in how and where people do business. From the near universal work from home trends to the resulting need to enhance interorganizational...
The Lady Hacker Chronicles chapter VIII
In this week's edition of the Lady Hacker Chronicles, we see what it takes to set up a BadUSB attack with Social Engineering...
The lady hacker chronicles chapter VII
Everyone is using QR codes these days. Must be safe, right? In this week's edition of the Lady Hacker Chronicles, we see what it takes to launch a QR Scanning Attack. Will you think twice before your next scan?
The lady hacker chronicles chapter VI
In this week's edition of the Lady Hacker Chronicles, we dive into Juice Jacking. Hope you're thirsty.
iHLS Smart Cities Panel
On Dec 8, 2020 odix CEO Dr. Oren Eytan joined a lively panel, hosted by iHLS, on Smart Cities. In his remarks Dr. Eytan focused in the importance of protecting urban infrastructure and securing citizens...
What keeps you up at night podcast with Scott Schober
‘It’s an asymmetric game where the attacker only needs to succeed once while the defender needs to block everything’ ...
The lady hacker chronicles chapter V
In this week's edition of the Lady Hacker Chronicles, we see what it takes to Impersonate a Public WIFI Network. happy surfing. to learn more, click below
The lady hacker chronicles chapter IV
In this week's edition of the Lady Hacker Chronicles, we look at the price to be paid in a DDOS attack. Gobble gobble. to learn more, read below
interworks.cloud and odix announce FileWall Distribution Partnership
Rosh Ha’Ayin, Israel, March 1,2021: interworks.cloud & odix have officially announced that FileWall, odix’s flagship Content Disarm & Reconstruction (CDR)...
FileWall™ by odix is now available through Ingram Micro’s CloudBlue Platform
Rosh Ha’ayin, Israel, Feb 18, 2021: odix, an Israel-based cybersecurity company has announced that FileWall™, its flagship security add-on to defend...
odix CEO Dr. Oren Eytan has been selected a 2021 CRN Crew Chief
odix CEO Dr. Oren Eytan has been named to the 2021 list of Channel Chiefs. The prestigious CRN® Channel Chiefs list...
Pillar Technology Partners Announces Strategic Partnership with odix
Atlanta-based cyber security experts now offering expanded cybersecurity solution...
Cyway signs Distribution Agreement with odix in the Middle East
Dubai, UAE, Jan 25th, 2021 -- Cyway, a UAE based cybersecurity solutions provider specializing in identity-centric and cloud security, has announced that it...
Aztek Technologies licenses odix FileWall™ to protect its customers from Microsoft 365 focused ransomware threats
Aztek will deploy FileWall licenses to its customers in order to protect them from file-based email cyber attacks...
odix accepted into Forbes Technology Council
Rosh Ha’ayin, Israel, Nov 5, 2020— Dr Oren Eytan, CEO of Israel-based cybersecurity leader in CDR (Content Disarm and Reconstruction) technology company...
odix launches FileWall CSP Partner Program for Microsoft Ecosystem
Rosh Ha’ayin, Israel: Oct 28, 2020, odix, the Israel based cyber security leader in CDR (Content Disarm and Reconstruction) technology, is officially announcing the launch of the FileWall Cloud Solution Provider Partner Program.
odix joins the Microsoft Intelligent Security Association (MISA) program extending FileWall ™ security logs to Microsoft Azure Sentinel
Rosh Ha’ayin, Israel: Sep 30th, odix, the Israel based cyber security leader in Enterprise CDR (Content Disarm and Reconstruction) technology, has officially joined...
odix launches FileWall (Firewall for Files) for Microsoft 365 Mail Attachments
Israel-based cybersecurity company releases FileWall for Exchange Online, available exclusively through Microsoft AppSource Rosh Haayin, Israel — September 14, 2020
The rise of MSP & CSP Vulnerabilities: Storehouses for secure data
Managed & Cloud Service Providers (MSP & CSP) serve an invaluable role in operating and securing companies' digital assets...
5 Ways to Improve Email Security
Protecting email platforms from malware and cyberattacks is quickly becoming the most important fight in the battle for cybersecurity. While hackers and their destructive new malware, ransomware, and social engineering...
Protecting Yourself Is Protecting Your Clients
The number one rule that MSPs and CSPs need to follow is, “Practice what you preach”. You may have done a great job by ensuring your clients’ security but what if you failed to...
Tech & Main Podcast Blog
A few short weeks ago odix CEO, Dr. Oren Eytan was privileged to join Shaun St. Hill on the Tech & Main Podcast to speak about his journey from 18-year-old military...
When Military Cybertech Goes Mainstream
For decades, cyberwarfare has threatened governments, enterprises and individuals with reckless disregard for the assets or lives they have impacted. Traditionally, cyberattacks were the domain...
5 Biggest Cyber-Attacks of 2020
From the recent SolarWinds hack and state sponsored attacks on covid-19 vaccine research, to the seemingly endless flow of ransomware attacks and...
Rise of international hacker networks
While many envision hackers as lone wolves or small networks of illicit players, recent data suggests state actors are increasingly taking a leading role in cyber warfare...
Who are the leading players in state sponsored cyber terrorism?
Who is hacking your network, and why are you being targeted? Historically, hackers operated in limited cells consisting of small-scale networks of highly trained individuals. The aim was clear: to extort businesses and VIPs for economic gain...
odix Year in Review
2020, more so than any time in recent memory has seen massive shifts in how and where people do business. From the near universal work from home trends to the resulting need to enhance interorganizational...
iHLS Smart Cities Panel
On Dec 8, 2020 odix CEO Dr. Oren Eytan joined a lively panel, hosted by iHLS, on Smart Cities. In his remarks Dr. Eytan focused in the importance of protecting urban infrastructure and securing citizens...
Attackers mimic Microsoft Safelinks URLs in phishing campaign
On Feb 24 the odix team noticed a new phishing campaign which contained an HTML attachment spoofing a Microsoft login page...
ExRobotos: Old phishing kit resurfaces with new life
Summary: On Oct 27, the odix team detected a file-based phishing malware in an email attachment that was blocked by FileWall system...
Attachment based phishing uses CAPTCHA to avoid detection
Summary: On Oct 23, the odix team detected a file-based phishing malware in an email attachment that was blocked by FileWall system. To avoid detection the blocked attachment redirected the user to a website requiring...
Attachment-based phishing campaign
Summary: On Oct 21, the odix team detected a file-based phishing malware in an email attachment that was blocked by the FileWall system.
The lady hacker chronicles chapter IX
In this week's edition of the Lady Hacker Chronicles, we conclude our saga with an end of the year finale. How to plan an Attack in the Age of Social Distance. Do you have what it takes to hack your way to the new year?
The Lady Hacker Chronicles chapter VIII
In this week's edition of the Lady Hacker Chronicles, we see what it takes to set up a BadUSB attack with Social Engineering...
The lady hacker chronicles chapter VII
Everyone is using QR codes these days. Must be safe, right? In this week's edition of the Lady Hacker Chronicles, we see what it takes to launch a QR Scanning Attack. Will you think twice before your next scan?
The lady hacker chronicles chapter VI
In this week's edition of the Lady Hacker Chronicles, we dive into Juice Jacking. Hope you're thirsty.
The lady hacker chronicles chapter V
In this week's edition of the Lady Hacker Chronicles, we see what it takes to Impersonate a Public WIFI Network. happy surfing. to learn more, click below
The lady hacker chronicles chapter IV
In this week's edition of the Lady Hacker Chronicles, we look at the price to be paid in a DDOS attack. Gobble gobble. to learn more, read below
The lady hacker chronicles chapter III
In this week's edition of the Lady Hacker Chronicles, we look at the high stakes of ransomware attacks. Would you roll the dice?
The lady hacker chapter II
our journey through the Lady Hacker Chronicles continues with chapter 2: Let's go (spear) Phishing.
The lady hacker chronicles
odix is excited to invite its readers to an educational series of “The lady hacker chronicles”. The diary includes multiple chapters, each one starts with particular cyber-attack variation hackers around the world...
Coronavirus vs. Malware: Frightening Similarities & How to Stay Safe [Infographic]
Since the coronavirus burst into our lives, the news has been talking about the dangers it presents and how to stay safe. Simultaneously, cybersecurity threats have increased, as hackers take advantage of the situation.
Find out more

Contact
us


Request a
demo


Explore
Case Studies
