Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    Blog

    Stop Worrying and Start Isolating – How to Prevent the Next Big Attack

    By BUFFERZONE Team, 18/03/2024

    Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace®, Safe Browsing, NoCloud ™ Anti-Phishing A cyberattack targeting Microsoft Azure [1] has compromised numerous executive accounts and a significant leak of user

    Read More >

    The Rise of Deepfake Phishing Attacks

    By BUFFERZONE Team, 12/03/2024

    Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace®, Safe Browsing, NoCloud ™ Anti-Phishing The threat of deepfake phishing is not only real but also escalating rapidly. Reports [1, 2] indicate

    Read More >

    Stop Worrying and Start Isolating – Bumblebee is Back

    By BUFFERZONE Team, 19/02/2024

    Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace®, Safe Browsing, NoCloud ™ Anti-Phishing After a hiatus of four months, the Bumblebee malware has resumed its activities, launching phishing campaigns against

    Read More >

    Stop Worrying and Start Isolating – Qakbot is Back

    By BUFFERZONE Team, 5/02/2024

    Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace™, Safe Browsing, NoCloud ™ Anti-Phishing Recently, the Qakbot Trojan has appeared as a significant threat in the cyber world, targeting computers through

    Read More >

    The Beginners Guide – Reversing and Preventing the Invisible Malware and How CDR can improve Our Security (Part-3)

    By BUFFERZONE Team, 25/01/2024

    Target: Cybersecurity specialist Tags: JPEG, Image, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering. In this article, we venture into the intricacies of malicious malware attacks deployed via Joint Photographic

    Read More >

    Unveiling the Threat: HTA Fileless Malware Propagating Through Spam Mail

    By BUFFERZONE Team, 15/01/2024

    Target: IT Professionals Tags: Malware, HTA, Zero-Trust, Isolation Introduction In the ever-evolving landscape of cybersecurity threats, malicious actors continually find innovative ways to infiltrate our digital lives. One such emerging

    Read More >