Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    Blog

    Ransomware Infection Trend is Shifting How to Stay Protected

    By BUFFERZONE Team, 12/08/2023

    Target: IT Professionals Tags: Malware, Ransomware Zero-Trust, Safe Workspace®, Safe Browsing A recent report from Palo Alto [1] revealed that 2022 saw a major shift in ransomware delivery methods, with

    Read More >

    Re-thinking About Your Endpoint Security Strategy Against New Threats

    By BUFFERZONE Team, 4/08/2023

    Target: Consumers Tags: Zero-Trust, Isolation, Policy, CDR, Trust No File On July 16, 2023, researchers at DOCGuard [1] uncovered an incidence of a ZIP Bomb malware attack. Despite being scanned

    Read More >

    The Beginners Guide – Preventing the Invisible Malware What Is Steganalysis and How CDR can improve Our Security (Part-2)

    By BUFFERZONE Team, 31/07/2023

    Target: Consumers Tags:  Content Disarm and Reconstruction (CDR), Malware, Images, Steganography, Zero-Trust In our initial blog post, we explored the technique employed by malware authors to hide malicious code within

    Read More >

    What Can We Learn from VirusTotal Malware Trends Report 2023

    By BUFFERZONE Team, 27/07/2023

    Target: Consumers Tags:  Content Disarm and Reconstruction (CDR), Malware, Isolation, Safe Workspace®, Zero-Trust Several interesting trends were highlighted in the recent VirusTotal Malware Trends Report for July 2023. The report

    Read More >

    Digital Workspace Secured by Safe Workspace®

    By BUFFERZONE Team, 24/07/2023

    The rising trend of remote work and the inherent necessity for centralized management of an organization’s IT assets, including applications, data, and endpoints, has accentuated the need for a robust

    Read More >

    The Beginners Guide – Preventing the Invisible Malware How Steganography Works (Part-1)

    By BUFFERZONE Team, 20/07/2023

    Target: Consumers Tags:  Content Disarm and Reconstruction (CDR), Malware, Images, Steganography, Zero-Trust Throughout this blog series, we will delve into the following topics: understanding steganography (part 1), exploring steganalysis and

    Read More >