Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    Blog

    The beginners Guide To – OLE Malware Reverse Engineering Part 1

    By BUFFERZONE Team

    Target: Cybersecurity specialist Tags: OLE, PowerPoint, Excel, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering. Microsoft’s Object Linking and Embedding (OLE) [1] is an innovative technology framework that enables

    Read More >

    The beginners Guide To – Adobe PDF Malware Reverse Engineering Part 2

    By BUFFERZONE Team

    Target: Cybersecurity specialist Tags: Adobe PDF, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering In this blog we will continue the PDF malware analysis part –1 and continue to investigate

    Read More >

    What can we learn from Verizon Data Breach Investigation Report (DBIR)

    By BUFFERZONE Team

    Target: Consumers Tags: Threat Intelligence, Malware, Phishing, Insider Threat, Vulnerabilities, Ransomware, Credentials The 2023 Data Breach Investigations Report (DBIR) by Verizon Business has yielded several important insights into the current

    Read More >

    The beginners Guide To – Adobe PDF Malware Reverse Engineering Part 1

    By BUFFERZONE Team

    Target: Cybersecurity specialist Tags: Adobe PDF, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering An Adobe PDF (Portable Document Format) file is a file format developed by Adobe Systems. It

    Read More >

    OneNote Malware Attack Prevention Using Content Disarm and Reconstruction

    By BUFFERZONE Team

    Target: Cybersecurity professionals Tags: Microsoft Office, OneNote, Content Disarm & Reconstruction, Zero-Trust Microsoft OneNote [1] is a versatile application included in the Microsoft Office suite, specifically designed for effortless information

    Read More >

    Clipboard Hijacking attacks and How to Prevent Them

    By BUFFERZONE Team

    Target: IT Professionals Tags: Malware, Clipboard attack Computer clipboard hijacking attacks occur when an attacker gains unauthorized access to the clipboard of a computer to intercept or modify the data

    Read More >