Blog
Fileless Malware Attacks Are on the Rise- But Do not Worry
By BUFFERZONE Team, 6/07/2023
Target: Consumers Tags: Fileless Malware, Bypass antivirus, Isolation, CDR The cybersecurity arena experienced significant evolution in 2020, marked by a substantial rise in fileless malware attacks. The rate skyrocketed to
Read More >The Beginners Guide to Chrome Extension Research
By BUFFERZONE Team, 2/07/2023
Target: Cybersecurity specialist Tags: CRX, Chrome Extension, Malware, Reverse Engineering. A Chrome extension is a small software program that enhances the functionality of the Google Chrome browser. Extensions are made
Read More >Outsmarting The Chameleon: Preventing Polymorphic Attacks with Safe Workspace™
By BUFFERZONE Team, 26/06/2023
Target: Cybersecurity specialist Tags: Malware, Polymorphic, Generative AI (Artificial Intelligence), Zero-trust, Application Isolation Polymorphic malware is a malicious software variant that possesses the capability to alter, or “morph,” its own
Read More >Data Leakage and Ransomware Broke Attack Records in March 2023
By BUFFERZONE Team, 25/06/2023
Target: Consumers Tags: Vulnerabilities, Ransomware, MFA, CVE-2023-0669 A new report by BleepingComputer concludes that March 2023 “was the most prolific month recorded by cybersecurity analysts in recent years, measuring
Read More >The beginners Guide To – OLE Malware Reverse Engineering Part 1
By BUFFERZONE Team, 19/06/2023
Target: Cybersecurity specialist Tags: OLE, PowerPoint, Excel, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering. Microsoft’s Object Linking and Embedding (OLE) [1] is an innovative technology framework that enables
Read More >The beginners Guide To – Adobe PDF Malware Reverse Engineering Part 2
By BUFFERZONE Team, 15/06/2023
Target: Cybersecurity specialist Tags: Adobe PDF, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering In this blog we will continue the PDF malware analysis part –1 and continue to investigate
Read More >