Blog
Stop Worrying and Start Isolating – Limiting Removable Media Always Fails
By BUFFERZONE Team, 28/05/2024
Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace®, Safe Browsing, NoCloud™, Protection by containment™ Using portable media, such as USB drives, is paramount in enterprise cybersecurity. Nevertheless, these devices also
Read More >Stop Worrying and Start Isolating – The State of Ransomware 2024
By BUFFERZONE Team, 20/05/2024
Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace®, Safe Browsing, NoCloud™ AI Anti-Phishing, Protection by containment™ Despite law enforcement disruptions to major ransomware gangs like LockBit and BlackCat, Q1 2024
Read More >Bypassing Object Detection: The Rise of Steganography Phishing Attacks
By BUFFERZONE Team, 8/05/2024
Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace®, Safe Browsing, NoCloud ™ Anti-Phishing, Object Detection, Protection by containment™ The cybersecurity landscape constantly changes, and attackers always develop new ways to
Read More >Stop Worrying and Start Isolating – Darkgate Malspam Is Back
By BUFFERZONE Team, 7/05/2024
Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace®, Safe Browsing, NoCloud ™ Anti-Phishing, Protection by containment™ DarkGate malware attacks are spread through spam emails containing malicious attachments or links. This
Read More >Bypassing Object Detection: The Rise of Logo Manipulation in Phishing Attacks
By BUFFERZONE Team, 18/04/2024
Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace®, Safe Browsing, NoCloud ™ Anti-Phishing, Object Detection, Protection by containment™ In the ever-evolving cybersecurity landscape, phishing is still one of the oldest
Read More >Bypassing Object Detection: The Art of Login Text Manipulation in Phishing Attacks
By BUFFERZONE Team, 1/04/2024
Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace®, Safe Browsing, NoCloud ™ Anti-Phishing, Object Detection, Protection by containment™ Phishing attacks are a persistent threat in the ever-evolving landscape of cybersecurity.
Read More >