Saturday, March 2, 2024

Odix – An Enterprise-Grade File-Based Cyber Attack and Malware Protection to SMBs

Cybersecurity solutions provider odix has set its sights on bringing enterprise-grade cybersecurity to small to medium businesses (SMBs). The company specializes in file-based attack and malware protection which can greatly benefit smaller organizations, especially in today’s security landscape. SMBs are often susceptible to cyberattacks since they lack access to enterprise-grade solutions.

Fueling odix’s effort is the €2 million grant that the company recently received from the European Commission (EC). The EC, through its Horizon 2020 initiative, funds novel ideas that can support SMBs in order to boost growth and prosperity in Europe. The funding would allow odix to offer its solutions through the cloud as Software-as-a-Service (SaaS), making them more affordable and accessible to these companies.

“We are very excited to be finally making this move to serve SMBs. Despite the emergence of more complex threats, SMBs continue to lack access to capable solutions that can protect them. The grant would enable us to continue development on our platform and make our malware disarm technology available to these smaller organizations,” odix CEO Dr. Oren Eytan remarked.

Next-Generation Solutions are Emerging

While there are now a variety of attack methods that threaten businesses, companies continue to be vulnerable to file-based attacks. Almost every office and workplace today work with digital documents enabling hackers to use office files to conceal malware. Unfortunately, employees are prone to downloading and launching files without subjecting them to the necessary security checks.

Some of these documents may seem legitimate but they can actually house malware. When such a file is opened, the malware can execute, perform its designed hack, and spread throughout the network. The payload can destroy other important data or provide hackers ways to breach networks.

Fortunately, more specialized and sophisticated solutions such as malware disarming tools have emerged to mitigate such attacks. odix is an emerging leader in this file-based attack protection segment. Malware Protection removes malicious code and exploits contained in files. When the file has been stripped away from the malware, it is then rebuilt into a safer version ready for execution. Next-generation solutions can counter threats that antiviruses and sandboxes have trouble detecting or eliminating.

“Today’s file-based attacks and malware have become quite sophisticated. Polymorphic malware, for example, constantly changes its code and characteristics. This makes it hard for antiviruses and malware Protection which rely on file signatures to detect and remove these threats. Our malware disarm technology is capable of accurately identifying malicious code within files and cleaning them,” Dr. Eytan added.

odix also features proprietary True CDR (content disarm and reconstruction) algorithm which ensures that files remain usable after the sanitization process. Through this approach, odix ensures that all files retain their type and only the malicious code is removed.

( Click to Enlarge )

SMBs are Now Prime Targets

SMBs have become popular targets of cyberattacks largely due to their weak security measures.43% of cyberattacks target SMBs. In 2017,61% of data breach victims were companies with less than 1,000 employees. Falling victim to attacks can have dire consequences. SMBs not only can suffer losses due to downtime and corrupted data but also 60% of SMBs that get hacked are unable to sustain their businesses after six months.

File-based attacks are expected to increase over the coming years. Recently, ransomware has been among the most common payloads in malicious files. Ransomware encrypts and denies access to important files or documents unless a ransom is made.

Hackers figured that SMBs are more likely to pay the ransom since these companies have more to lose should they get locked out of their files. Most ransomware can encrypt thousands of employee and customer data and even project files and work output. In 2018, the average ransom demand was more than $116,000.

odix’s core technology, which has already been used by larger enterprises, successfully protected its users from popular ransomware outbreaks. None of odix’s clients were affected by Wannacry, Gandcrab, and Petya.

Conventional Measures Are Not Enough

SMBs usually dedicate their resources to other business areas such as sales and marketing. As such, they tend to overlook their cybersecurity and prefer to use free solutions such as antiviruses and personal firewalls. Unfortunately, most free antiviruses lack the ability to detect modern and complex malware.

Antiviruses typically rely on signature detection which assumes that a previously detected malware in its database will look the same in the future. This approach is now rendered almost useless by hackers that use polymorphic code that allows malware to change its appearance.

Another conventional cybersecurity measure that attempts to address file-based attacks is sandboxing. It uses an isolated environment where one can execute files to ensure that they will not harm other devices on the network.

However, sandboxing still has limitations. Advanced malware can detect a sandbox and, when it does, the malware can temporarily stop its execution.

In addition, cybercriminals can package malware into large files or different formats that a sandbox can’t process. Sandboxes also require dedicated personnel with technical knowledge which most SMBs lack.

Malware disarming is considered to be a large improvement upon these solutions as it can capably cover areas that antiviruses and sandboxes sorely lack. As SaaS, these solutions are expected to become easier to use especially for smaller organizations with limited budgets and technical knowledge.


As SMBs become the primary target of cybercrimes, making file-based attack protection available to these organizations cannot be timelier. When a small business is hit by a malware attack or data breach, not only is its operations jeopardized but its employees and clients are also put in danger.

Breaches can result in more damaging crimes such as identity theft and fraud. By providing enterprise-grade security for SMBs, odix can help create a safer business ecosystem where everyone’s data is kept secure.

“We believe that security is a shared responsibility. We want to do our part by bringing our solutions to a wider base. By serving SMBs, we are able to help their customers and stakeholders as well,” Dr. Eytan concluded.


Latest articles

AI Worm Developed by Researchers Spreads Automatically Between AI Agents

Researchers have developed what they claim to be one of the first generative AI...

20 Million+ Cutout.Pro User Records Leaked On Hacking Forums

CutOut.Pro, an AI-powered photo and video editing platform, has reportedly suffered a data breach,...

CWE Version 4.14 Released: What’s New!

The Common Weakness Enumeration (CWE) project, a cornerstone in the cybersecurity landscape, has unveiled...

RisePro Stealer Attacks Windows Users Steals Sensitive Data

A new wave of cyber threats has emerged as the RisePro information stealer targets...

Golden Corral Restaurant Chain Hacked: 180,000+ Users’ Data Stolen

The Golden Corral Corporation, a popular American restaurant chain, has suffered a significant data...

CISA Warns Of Hackers Exploiting Multiple Flaws In Ivanti VPN

Threat actors target and abuse VPN flaws because VPNs are often used to secure...

BEAST AI Jailbreak Language Models Within 1 Minute With High Accuracy

Malicious hackers sometimes jailbreak language models (LMs) to exploit bugs in the systems so...

Live Account Takeover Attack Simulation

Live Account Take Over Attack

Live Webinar on How do hackers bypass 2FA ,Detecting ATO attacks, A demo of credential stuffing, brute force and session jacking-based ATO attacks, Identifying attacks with behaviour-based analysis and Building custom protection for applications and APIs.

Related Articles