Friday, May 2, 2025
HomeCyber AttackOdix - An Enterprise-Grade File-Based Cyber Attack and Malware Protection to SMBs

Odix – An Enterprise-Grade File-Based Cyber Attack and Malware Protection to SMBs

Published on

SIEM as a Service

Follow Us on Google News

Cybersecurity solutions provider odix has set its sights on bringing enterprise-grade cybersecurity to small to medium businesses (SMBs). The company specializes in file-based attack and malware protection which can greatly benefit smaller organizations, especially in today’s security landscape. SMBs are often susceptible to cyberattacks since they lack access to enterprise-grade solutions.

Fueling odix’s effort is the €2 million grant that the company recently received from the European Commission (EC). The EC, through its Horizon 2020 initiative, funds novel ideas that can support SMBs in order to boost growth and prosperity in Europe. The funding would allow odix to offer its solutions through the cloud as Software-as-a-Service (SaaS), making them more affordable and accessible to these companies.

“We are very excited to be finally making this move to serve SMBs. Despite the emergence of more complex threats, SMBs continue to lack access to capable solutions that can protect them. The grant would enable us to continue development on our platform and make our malware disarm technology available to these smaller organizations,” odix CEO Dr. Oren Eytan remarked.

- Advertisement - Google News

Next-Generation Solutions are Emerging

While there are now a variety of attack methods that threaten businesses, companies continue to be vulnerable to file-based attacks. Almost every office and workplace today work with digital documents enabling hackers to use office files to conceal malware. Unfortunately, employees are prone to downloading and launching files without subjecting them to the necessary security checks.

Some of these documents may seem legitimate but they can actually house malware. When such a file is opened, the malware can execute, perform its designed hack, and spread throughout the network. The payload can destroy other important data or provide hackers ways to breach networks.

Fortunately, more specialized and sophisticated solutions such as malware disarming tools have emerged to mitigate such attacks. odix is an emerging leader in this file-based attack protection segment. Malware Protection removes malicious code and exploits contained in files. When the file has been stripped away from the malware, it is then rebuilt into a safer version ready for execution. Next-generation solutions can counter threats that antiviruses and sandboxes have trouble detecting or eliminating.

“Today’s file-based attacks and malware have become quite sophisticated. Polymorphic malware, for example, constantly changes its code and characteristics. This makes it hard for antiviruses and malware Protection which rely on file signatures to detect and remove these threats. Our malware disarm technology is capable of accurately identifying malicious code within files and cleaning them,” Dr. Eytan added.

odix also features proprietary True CDR (content disarm and reconstruction) algorithm which ensures that files remain usable after the sanitization process. Through this approach, odix ensures that all files retain their type and only the malicious code is removed.

( Click to Enlarge )

SMBs are Now Prime Targets

SMBs have become popular targets of cyberattacks largely due to their weak security measures.43% of cyberattacks target SMBs. In 2017,61% of data breach victims were companies with less than 1,000 employees. Falling victim to attacks can have dire consequences. SMBs not only can suffer losses due to downtime and corrupted data but also 60% of SMBs that get hacked are unable to sustain their businesses after six months.

File-based attacks are expected to increase over the coming years. Recently, ransomware has been among the most common payloads in malicious files. Ransomware encrypts and denies access to important files or documents unless a ransom is made.

Hackers figured that SMBs are more likely to pay the ransom since these companies have more to lose should they get locked out of their files. Most ransomware can encrypt thousands of employee and customer data and even project files and work output. In 2018, the average ransom demand was more than $116,000.

odix’s core technology, which has already been used by larger enterprises, successfully protected its users from popular ransomware outbreaks. None of odix’s clients were affected by Wannacry, Gandcrab, and Petya.

Conventional Measures Are Not Enough

SMBs usually dedicate their resources to other business areas such as sales and marketing. As such, they tend to overlook their cybersecurity and prefer to use free solutions such as antiviruses and personal firewalls. Unfortunately, most free antiviruses lack the ability to detect modern and complex malware.

Antiviruses typically rely on signature detection which assumes that a previously detected malware in its database will look the same in the future. This approach is now rendered almost useless by hackers that use polymorphic code that allows malware to change its appearance.

Another conventional cybersecurity measure that attempts to address file-based attacks is sandboxing. It uses an isolated environment where one can execute files to ensure that they will not harm other devices on the network.

However, sandboxing still has limitations. Advanced malware can detect a sandbox and, when it does, the malware can temporarily stop its execution.

In addition, cybercriminals can package malware into large files or different formats that a sandbox can’t process. Sandboxes also require dedicated personnel with technical knowledge which most SMBs lack.

Malware disarming is considered to be a large improvement upon these solutions as it can capably cover areas that antiviruses and sandboxes sorely lack. As SaaS, these solutions are expected to become easier to use especially for smaller organizations with limited budgets and technical knowledge.

Conclusion

As SMBs become the primary target of cybercrimes, making file-based attack protection available to these organizations cannot be timelier. When a small business is hit by a malware attack or data breach, not only is its operations jeopardized but its employees and clients are also put in danger.

Breaches can result in more damaging crimes such as identity theft and fraud. By providing enterprise-grade security for SMBs, odix can help create a safer business ecosystem where everyone’s data is kept secure.

“We believe that security is a shared responsibility. We want to do our part by bringing our solutions to a wider base. By serving SMBs, we are able to help their customers and stakeholders as well,” Dr. Eytan concluded.

Latest articles

Dutch Services Disrupted by DDoS Attacks From Russian-Affiliated Hacktivists

Multiple Dutch organizations have experienced significant service disruptions this week due to a series...

Seven Malicious Packages Exploit Gmail SMTP to Run Harmful Commands

A major supply chain security incident has rocked the Python open-source community as researchers...

CISA Issues New ICS Advisories Addressing Critical Vulnerabilities and Exploits

The Cybersecurity and Infrastructure Security Agency (CISA) has issued two new advisories revealing critical...

NVIDIA TensorRT-LLM Vulnerability Let Hackers Run Malicious Code

NVIDIA has issued an urgent security advisory after discovering a significant vulnerability (CVE-2025-23254) in...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

AiTM Phishing Kits Bypass MFA by Hijacking Credentials and Session Tokens

Darktrace's Security Operations Center (SOC) in late 2024 and early 2025, cybercriminals have been...

Nitrogen Ransomware Uses Cobalt Strike and Log Wiping in Targeted Attacks on Organizations

Threat actors have leveraged the Nitrogen ransomware campaign to target organizations through deceptive malvertising...

TheWizards Deploy ‘Spellbinder Hacking Tool’ for Global Adversary-in-the-Middle Attack

ESET researchers have uncovered sophisticated attack techniques employed by a China-aligned threat actor dubbed...