Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly

Blog

PowerShell Exploits: What they are and How to Defend Against Them

By BUFFERZONE Team, 12/02/2019

PowerShell has recently become one of Cybercriminals’ favorite assets to exploit, and security experts are predicting an increase in such exploits. In this article we’ll try to understand PowerShell exploits,

Read More >

Defending Against Fileless Malware

By BUFFERZONE Team, 14/08/2018

Fileless malware has attracted a lot of attention recently, due to the difficulty that security solutions are having in defending against it. The attackers are also aware of the defenders’

Read More >

Emotet: An Example of Evolving Malware

By BUFFERZONE Team, 26/06/2018

The never-ending battle between cybercriminals and the cyber security establishment is well-known even outside the security community, to the general public. Elsewhere, we’ve written about some aspects of this struggle,

Read More >

New Windows VBScript Vulnerability: A Case Study

By BUFFERZONE Team, 10/06/2018

This recently-exploited Windows vulnerability, first discovered in April 2018 and officially recognized by Microsoft in May, provides a fascinating glimpse into methods used by malicious attackers, and has some wider

Read More >