Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    Blog

    Fileless Malware Attacks Are on the Rise- But Do not Worry

    By BUFFERZONE Team, 6/07/2023

    Target: Consumers Tags: Fileless Malware, Bypass antivirus, Isolation, CDR The cybersecurity arena experienced significant evolution in 2020, marked by a substantial rise in fileless malware attacks. The rate skyrocketed to

    Read More >

    The Beginners Guide to Chrome Extension Research

    By BUFFERZONE Team, 2/07/2023

    Target: Cybersecurity specialist Tags: CRX, Chrome Extension, Malware, Reverse Engineering. A Chrome extension is a small software program that enhances the functionality of the Google Chrome browser. Extensions are made

    Read More >

    Outsmarting The Chameleon: Preventing Polymorphic Attacks with Safe Workspace™

    By BUFFERZONE Team, 26/06/2023

    Target: Cybersecurity specialist Tags:  Malware, Polymorphic, Generative AI (Artificial Intelligence), Zero-trust, Application Isolation Polymorphic malware is a malicious software variant that possesses the capability to alter, or “morph,” its own

    Read More >

    Data Leakage and Ransomware Broke Attack Records in March 2023

    By BUFFERZONE Team, 25/06/2023

    Target: Consumers Tags:  Vulnerabilities, Ransomware, MFA, CVE-2023-0669   A new report by BleepingComputer concludes that March 2023 “was the most prolific month recorded by cybersecurity analysts in recent years, measuring

    Read More >

    The beginners Guide To – OLE Malware Reverse Engineering Part 1

    By BUFFERZONE Team, 19/06/2023

    Target: Cybersecurity specialist Tags: OLE, PowerPoint, Excel, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering. Microsoft’s Object Linking and Embedding (OLE) [1] is an innovative technology framework that enables

    Read More >

    The beginners Guide To – Adobe PDF Malware Reverse Engineering Part 2

    By BUFFERZONE Team, 15/06/2023

    Target: Cybersecurity specialist Tags: Adobe PDF, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering In this blog we will continue the PDF malware analysis part –1 and continue to investigate

    Read More >