
How to protect from the MSDT “Follina” Vulnerability?
What do sex extortion email, a rustic village in northern Italy, and a popular Russian radio station have in common?
16 reasons to sell Teams apps by Microsoft
FileWall™ was recently included as part of Microsoft’s “16 Reasons to Sell Teams Apps” eBook. Microsoft Teams is a cross-functional platform...
SVA Distribution signs Distribution Agreement with odix in Hong-Kong
May, 24th, 2022, Hong-Kong – SVA Distribution has announced that it has signed a distribution agreement with odix, an established cyber security leader...
Top 5 IT security Conferences of Q2/2022
After finally replacing the virtual conferences for face-to-face meetings, it is time to review the most anticipated cybersecurity events..
Are you a Microsoft CSP? Get a $20,000 marketing budget for Q2/2022
Microsoft has recently published its new program for helping CSPs fund marketing initiatives for selected applications available through the Microsoft Marketplaces...
Malware-Free Press
odix Summarizes Q1 2022
In The Media
This blog post is dedicated to all the journalists who reviewed odix, our Deep File Analysis technology and solutions (FileWall in particular)...
Dispelling CyberSecurity Biggest Myths
Consensus in cybersecurity is hard to come by. From CISOs with the resources and motivation, to think big to nontechnical executives...
Cloud Migration Panel Review
On March 1st, 2022 odix hosted an exciting panel discussion on Cloud Migration and Cyber Risk. The conversation featured industry leaders...
H4unt3d Hacker Podcast Review
On Feb 10, Mike Jones of the H4unt3d Hacker Podcast hosted odix CEO Dr. Oren Eytan & Head of PR Yehudah...
How to manage Microsoft 365 default blocking of Macros
Hackers will use any and every avenue of attack to gain access to your vital information and sensitive data...
FileWall™ is also in ALSO
We are excited to share with our followers that FileWall™ is now available in the ALSO catalog for Microsoft 365 resellers...
Cyber-Love? Hacking and Cybercrime in Dating Apps
Everyone knows, navigating dating and relationships can be like walking through a minefield. When you add cybercriminals to the mix...
Top 5 Conferences for the Microsoft 365 community in 2022
With over 300 million users, the Microsoft community is one of the largest forces in the conference scene...
How to get $20K marketing sponsorship from Microsoft?
Microsoft is helping certified CSPs to accelerate sales for selected transact apps available through the Microsoft Marketplaces...
Top 5 IT security Conferences of Q1/2022
2022 presents the opportunity to finally rejoin our peers and start to go back to many of the leading global IT conferences...
Top cyber trends of 2022: Part II RaaS, SMB and cloud security
2022 is already primed to be a year of major technological breakthrough as well as the inevitable cyber attacks...
Who Influences Morality in cyber?
The cyber domain is full of murky moral situations and transactions which constantly test the ethical compass of users and hackers alike...
Top cyber trends of 2022:
Part I
The cloud security ecosystem is growing almost as quickly as users' demands for innovative products and dynamic security solutions...
Digital Transformation Security: Guidelines for Success
With the workforce going remote and IP existing almost exclusively in the digital domain enterprises, local and federal agencies, and SMBs...
A Recipe for Destruction: Municipalities and Managing Cyber Risk
While civil unrest and the global pandemic have catalyzed the news cycle, cyber-attacks and their lasting effects have been devastating municipalities around the globe. Unfortunately, where businesses and individuals may be able to respond to these threats tactfully, municipalities have been left in the dust, ineffectively [...]
2021 – Year in review
The past year has brought significant growth and major developments across all elements of odix’s business. From exciting new partnerships and distribution agreements...
Smuggling files through Microsoft365 type filters
Microsoft365 has two type filter mechanisms, one in Microsoft365 Defender and the other in the exchange mail flow rules. We tested their individual...
Integrity Labs Partners Announces Strategic Partnership with odix
Hong Kong, December 7, 2021- Integrity Labs and odix are pleased to announce that they have formed a strategic partnership, providing Integrity Labs...
C-Data will distribute odix’s advanced security solutions in Israel
Rosh Ha’ayin, Israel, Nov 30, 2021: C-Data, a leading Israel based information security solution distributor, will market and implement...
SVA Distribution signs Distribution Agreement with odix in Hong-Kong
May, 24th, 2022, Hong-Kong – SVA Distribution has announced that it has signed a distribution agreement with odix, an established cyber security leader...
Integrity Labs Partners Announces Strategic Partnership with odix
Hong Kong, December 7, 2021- Integrity Labs and odix are pleased to announce that they have formed a strategic partnership, providing Integrity Labs...
C-Data will distribute odix’s advanced security solutions in Israel
Rosh Ha’ayin, Israel, Nov 30, 2021: C-Data, a leading Israel based information security solution distributor, will market and implement...
ICOS signs a distribution agreement with odix
Ferrara - 10 November 2021 - ICOS, value added distributor of IT infrastructure and cybersecurity solutions, announces it has signed a distribution...
CountryMark selects odix to provide protection from ransomware and zero-day attacks
odix will provide advanced cloud and file sanitization services to CountryMark through a range of odix’s advanced deep file inspection products...
Fairline Technology Co. to distribute odix’s malware fighting solutions in Taiwan
September 29th, 2021 – Taipei - Fairline Technology Co. announced that it has obtained the distributorship of odix in Taiwan to expand its product...
odix announces its hardened Ubuntu OS as a contribution to the IT community
Rosh Ha’ayin, Israel, August 25, 2021: odix, the Israel-based cybersecurity leader in File-Based malware prevention solutions has officially launched its hardened Ubuntu...
Halodata signs Distribution Agreement with odix in Asia
August 17, 2021 – Halodata, a value-added distributor with operations in Singapore, Indonesia, and Malaysia has announced that it has signed a distribution agreement with odix...
NetFolder for Secure file Uploads by odix is now available on the Microsoft Azure Marketplace
Microsoft Azure customers worldwide now gain access to NetFolder to take advantage of the scalability, reliability and agility of Azure to drive advanced security for business processes...
The Israeli Ministry of Communication selects odix to provide protection from ransomware and zero-day attacks
odix won the tender to provide advanced cloud sanitization services to the Salesforce CRM deployment of the Ministry of Communications for the next five years...
How to protect from the MSDT “Follina” Vulnerability?
What do sex extortion email, a rustic village in northern Italy, and a popular Russian radio station have in common?
16 reasons to sell Teams apps by Microsoft
FileWall™ was recently included as part of Microsoft’s “16 Reasons to Sell Teams Apps” eBook. Microsoft Teams is a cross-functional platform...
Top 5 IT security Conferences of Q2/2022
After finally replacing the virtual conferences for face-to-face meetings, it is time to review the most anticipated cybersecurity events..
Are you a Microsoft CSP? Get a $20,000 marketing budget for Q2/2022
Microsoft has recently published its new program for helping CSPs fund marketing initiatives for selected applications available through the Microsoft Marketplaces...
Malware-Free Press
odix Summarizes Q1 2022
In The Media
This blog post is dedicated to all the journalists who reviewed odix, our Deep File Analysis technology and solutions (FileWall in particular)...
Dispelling CyberSecurity Biggest Myths
Consensus in cybersecurity is hard to come by. From CISOs with the resources and motivation, to think big to nontechnical executives...
Cloud Migration Panel Review
On March 1st, 2022 odix hosted an exciting panel discussion on Cloud Migration and Cyber Risk. The conversation featured industry leaders...
H4unt3d Hacker Podcast Review
On Feb 10, Mike Jones of the H4unt3d Hacker Podcast hosted odix CEO Dr. Oren Eytan & Head of PR Yehudah...
How to manage Microsoft 365 default blocking of Macros
Hackers will use any and every avenue of attack to gain access to your vital information and sensitive data...
FileWall™ is also in ALSO
We are excited to share with our followers that FileWall™ is now available in the ALSO catalog for Microsoft 365 resellers...
Smuggling files through Microsoft365 type filters
Microsoft365 has two type filter mechanisms, one in Microsoft365 Defender and the other in the exchange mail flow rules. We tested their individual...
Remittance Advice/ Swift Ref: TRF675066, a malicious Phishing HTML attachment that bypasses Exchange Online’s EOP
Recently the odix team found a new phishing scenario that possesses a unique threat to end-users. Remittance Advice/ Swift...
Ariana Grande, audio on play and Microsoft 365 credentials hacked in RSS feed
On March 24 the odix team found a new malware which possess a unique threat to end users. The malware, which was discovered and sanitized by FileWall...
Attackers mimic Microsoft Safelinks URLs in phishing campaign
On Feb 24 the odix team noticed a new phishing campaign which contained an HTML attachment spoofing a Microsoft login page...
ExRobotos: Old phishing kit resurfaces with new life
Summary: On Oct 27, the odix team detected a file-based phishing malware in an email attachment that was blocked by FileWall system...
Attachment based phishing uses CAPTCHA to avoid detection
Summary: On Oct 23, the odix team detected a file-based phishing malware in an email attachment that was blocked by FileWall system. To avoid detection the blocked attachment redirected the user to a website requiring...
Attachment-based phishing campaign
Summary: On Oct 21, the odix team detected a file-based phishing malware in an email attachment that was blocked by the FileWall system.
#PassoveReset
The 10 plagues of Cybersecurity
11 Fundamentals to keep your business safe from malware and ransomware
Interactive useful tips to protect your business.
The rise of MSPs-CSPs Vulnerabilities
Managed & Cloud Service Providers (MSP & CSP) serve an invaluable role in operating and securing companies' digital assets...
File based attacks in social distancing era
In this week's edition of the Lady Hacker Chronicles, we conclude our saga with an end of the year finale. How to plan an Attack in the Age of Social Distance. Do you have what it takes to hack your way to the new year?
What is BadUSB and how it can impact your cyber security
In this week's edition of the Lady Hacker Chronicles, we see what it takes to set up a BadUSB attack with Social Engineering...
Are QR codes safe today?
Everyone is using QR codes these days. Must be safe, right? In this week's edition of the Lady Hacker Chronicles, we see what it takes to launch a QR Scanning Attack. Will you think twice before your next scan?
What is juice jacking?
In this week's edition of the Lady Hacker Chronicles, we dive into Juice Jacking. Hope you're thirsty.
How dangerous are public wifi networks?
In this week's edition of the Lady Hacker Chronicles, we see what it takes to Impersonate a Public WIFI Network. happy surfing. to learn more, click below.
How does DDOS attacks impact businesses?
In this week's edition of the Lady Hacker Chronicles, we look at the price to be paid in a DDOS attack. Gobble gobble. to learn more, read below.
How easy is to create a Ransomware attack?
Another plot from The Lady Hacker Chronicles Series.