Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    Blog

    What Are Adversarial Artificial Intelligence Attacks

    By BUFFERZONE Team

    Target: Consumers Tags:  Machine Learning, Deep Learning, Adversarial, Artificial Intelligence As we enter an era dominated by Artificial Intelligence (AI), new vulnerabilities are exposed, and new threat landscapes evolve. One

    Read More >

    Why EDR Alerts Aren’t Enough: The Case for BUFFERZONE® Safe Workspace®

    By BUFFERZONE Team

    The subject of discussion pertains to cybersecurity and the potential inadequacy of relying exclusively on Endpoint Detection and Response (EDR) alerts that are transmitted to a Security Information and Event

    Read More >

    The Beginner’s Guide To – OOXML Malware Reverse Engineering Part 1

    By BUFFERZONE Team

    Target: Cybersecurity specialist Tags: OOXML, Word, PowerPoint, Excell, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering, Zero-Trust. Microsoft Office Open XML (OOXML) used from the 2007 version of Office documents

    Read More >

    The Beginner’s Guide To – RTF Malware Reverse Engineering Part 2

    By BUFFERZONE Team

    Target: Cybersecurity specialist Tags: RTF, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering, Zero-Trust. In this second blog post we will focus on RTF file analysis with RTFOBJ from

    Read More >

    The Beginner’s Guide To – RTF Malware Reverse Engineering Part 1

    By BUFFERZONE Team

    Target: Cybersecurity specialist Tags: RTF, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering, Zero-Trust. The Rich Text Format (RTF) is a file format that enables the exchange of text

    Read More >

    Ransomware Infection Trend is Shifting How to Stay Protected

    By BUFFERZONE Team

    Target: IT Professionals Tags: Malware, Ransomware Zero-Trust, Safe Workspace®, Safe Browsing A recent report from Palo Alto [1] revealed that 2022 saw a major shift in ransomware delivery methods, with

    Read More >