Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly

Blog

Vendor Browser Hardening: Good Enough?

By BUFFERZONE Team, 20/05/2020

Browser vendors such as Microsoft and Google invest significant thought and resources into making sure that the browsers are secure from exploitation, from starting with a secure architecture to integrating

Read More >

The Corona Cyber Threat: Chat, Conferencing and Collaboration

By Yehuda Rock, 17/03/2020

As the world focuses on the physical threat that COVID-19 poses to our health, lives, and economies worldwide, here in the cyber security industry we need to also think about

Read More >

Fake Updates: Taking Advantage of Responsible Users

By Yehuda Rock, 5/11/2019

These days, even relatively unsophisticated users are aware of the significant dangers posed by computer malware and are aware of the need to protect their assets against it. And one

Read More >

PowerShell Exploits: What they are and How to Defend Against Them

By BUFFERZONE Team, 12/02/2019

PowerShell has recently become one of Cybercriminals’ favorite assets to exploit, and security experts are predicting an increase in such exploits. In this article we’ll try to understand PowerShell exploits,

Read More >