Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    Blog

    Data Leakage and Ransomware Broke Attack Records in March 2023

    By BUFFERZONE Team, 25/06/2023

    Target: Consumers Tags:  Vulnerabilities, Ransomware, MFA, CVE-2023-0669   A new report by BleepingComputer concludes that March 2023 “was the most prolific month recorded by cybersecurity analysts in recent years, measuring

    Read More >

    The beginners Guide To – OLE Malware Reverse Engineering Part 1

    By BUFFERZONE Team, 19/06/2023

    Target: Cybersecurity specialist Tags: OLE, PowerPoint, Excel, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering. Microsoft’s Object Linking and Embedding (OLE) [1] is an innovative technology framework that enables

    Read More >

    The beginners Guide To – Adobe PDF Malware Reverse Engineering Part 2

    By BUFFERZONE Team, 15/06/2023

    Target: Cybersecurity specialist Tags: Adobe PDF, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering In this blog we will continue the PDF malware analysis part –1 and continue to investigate

    Read More >

    What can we learn from Verizon Data Breach Investigation Report (DBIR)

    By BUFFERZONE Team, 12/06/2023

    Target: Consumers Tags: Threat Intelligence, Malware, Phishing, Insider Threat, Vulnerabilities, Ransomware, Credentials The 2023 Data Breach Investigations Report (DBIR) by Verizon Business has yielded several important insights into the current

    Read More >

    The beginners Guide To – Adobe PDF Malware Reverse Engineering Part 1

    By BUFFERZONE Team, 8/06/2023

    Target: Cybersecurity specialist Tags: Adobe PDF, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering An Adobe PDF (Portable Document Format) file is a file format developed by Adobe Systems. It

    Read More >

    OneNote Malware Attack Prevention Using Content Disarm and Reconstruction

    By BUFFERZONE Team, 5/06/2023

    Target: Cybersecurity professionals Tags: Microsoft Office, OneNote, Content Disarm & Reconstruction, Zero-Trust Microsoft OneNote [1] is a versatile application included in the Microsoft Office suite, specifically designed for effortless information

    Read More >