Blog
Security Made Simple -Prevent HTML Smuggling Attacks
By BUFFERZONE Team, 7/09/2023
Target: Consumers Tags: Zero-Trust, Isolation, Policy, Trust No File HTML smuggling [3] is a technique adversaries use to deliver malicious payloads to a target’s system by exploiting HTML5 features and
Read More >What Are Adversarial Artificial Intelligence Attacks
By BUFFERZONE Team, 5/09/2023
Target: Consumers Tags: Machine Learning, Deep Learning, Adversarial, Artificial Intelligence As we enter an era dominated by Artificial Intelligence (AI), new vulnerabilities are exposed, and new threat landscapes evolve. One
Read More >Why EDR Alerts Aren’t Enough: The Case for BUFFERZONE® Safe Workspace™
By BUFFERZONE Team, 30/08/2023
The subject of discussion pertains to cybersecurity and the potential inadequacy of relying exclusively on Endpoint Detection and Response (EDR) alerts that are transmitted to a Security Information and Event
Read More >The Beginner’s Guide To – OOXML Malware Reverse Engineering Part 1
By BUFFERZONE Team, 24/08/2023
Target: Cybersecurity specialist Tags: OOXML, Word, PowerPoint, Excell, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering, Zero-Trust. Microsoft Office Open XML (OOXML) used from the 2007 version of Office documents
Read More >The Beginner’s Guide To – RTF Malware Reverse Engineering Part 2
By BUFFERZONE Team, 21/08/2023
Target: Cybersecurity specialist Tags: RTF, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering, Zero-Trust. In this second blog post we will focus on RTF file analysis with RTFOBJ from
Read More >The Beginner’s Guide To – RTF Malware Reverse Engineering Part 1
By Loren Rozenbloom, 17/08/2023
Target: Cybersecurity specialist Tags: RTF, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering, Zero-Trust. The Rich Text Format (RTF) is a file format that enables the exchange of text
Read More >