Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    Blog

    The Beginners Guide – Preventing the Invisible Malware How Steganography Works (Part-1)

    By BUFFERZONE Team, 20/07/2023

    Target: Consumers Tags:  Content Disarm and Reconstruction (CDR), Malware, Images, Steganography, Zero-Trust Throughout this blog series, we will delve into the following topics: understanding steganography (part 1), exploring steganalysis and

    Read More >

    BUFFERZONE® Safe Workspace™ Prevention and Protection In MITRE® D3FEND™ Framework

    By BUFFERZONE Team, 17/07/2023

    Target: Consumers Tags:  MITRE® D3FEND™, MITRE® ATT&CK™, Safe Workspace™, CDR, Isolation In the ever-evolving landscape of cybersecurity, frameworks play a vital role in understanding and explaining how to defend against

    Read More >

    The beginner’s Guide To – OLE Malware Reverse Engineering Part 2

    By BUFFERZONE Team, 13/07/2023

    Target: Cybersecurity specialist Tags: OLE, PowerPoint, Excel, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering. In the second section, we introduced a fundamental approach to reverse-engineering a harmful OLE

    Read More >

    Big Head Ransomware Fake Windows Update Alert- What Can We Do?

    By BUFFERZONE Team, 11/07/2023

    Target: IT Professionals Tags: Malware, Ransomware Zero-Trust Ransomware remains a significant cybersecurity concern, posing threats to personal and enterprise data. The Big Head Ransomware is a new entrant into the

    Read More >

    Fileless Malware Attacks Are on the Rise- But Do not Worry

    By BUFFERZONE Team, 6/07/2023

    Target: Consumers Tags: Fileless Malware, Bypass antivirus, Isolation, CDR The cybersecurity arena experienced significant evolution in 2020, marked by a substantial rise in fileless malware attacks. The rate skyrocketed to

    Read More >

    The Beginners Guide to Chrome Extension Research

    By BUFFERZONE Team, 2/07/2023

    Target: Cybersecurity specialist Tags: CRX, Chrome Extension, Malware, Reverse Engineering. A Chrome extension is a small software program that enhances the functionality of the Google Chrome browser. Extensions are made

    Read More >