Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    Blog

    The Beginner’s Guide To – RTF Malware Reverse Engineering Part 1

    By BUFFERZONE Team, 17/08/2023

    Target: Cybersecurity specialist Tags: RTF, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering, Zero-Trust. The Rich Text Format (RTF) is a file format that enables the exchange of text

    Read More >

    Ransomware Infection Trend is Shifting How to Stay Protected

    By BUFFERZONE Team, 12/08/2023

    Target: IT Professionals Tags: Malware, Ransomware Zero-Trust, Safe Workspace™, Safe Browsing A recent report from Palo Alto [1] revealed that 2022 saw a major shift in ransomware delivery methods, with

    Read More >

    Re-thinking About Your Endpoint Security Strategy Against New Threats

    By BUFFERZONE Team, 4/08/2023

    Target: Consumers Tags: Zero-Trust, Isolation, Policy, CDR, Trust No File On July 16, 2023, researchers at DOCGuard [1] uncovered an incidence of a ZIP Bomb malware attack. Despite being scanned

    Read More >

    The Beginners Guide – Preventing the Invisible Malware What Is Steganalysis and How CDR can improve Our Security (Part-2)

    By BUFFERZONE Team, 31/07/2023

    Target: Consumers Tags:  Content Disarm and Reconstruction (CDR), Malware, Images, Steganography, Zero-Trust In our initial blog post, we explored the technique employed by malware authors to hide malicious code within

    Read More >

    What Can We Learn from VirusTotal Malware Trends Report 2023

    By BUFFERZONE Team, 27/07/2023

    Target: Consumers Tags:  Content Disarm and Reconstruction (CDR), Malware, Isolation, Safe Workspace™, Zero-Trust Several interesting trends were highlighted in the recent VirusTotal Malware Trends Report for July 2023. The report

    Read More >

    Digital Workspace Secured by Safe Workspace™

    By BUFFERZONE Team, 24/07/2023

    The rising trend of remote work and the inherent necessity for centralized management of an organization’s IT assets, including applications, data, and endpoints, has accentuated the need for a robust

    Read More >