Stop Worrying and Start Isolating – Protecting Industrial Control System (ICS)
By BUFFERZONE Team, 22/07/2024
Target: ICS Professionals (Elementary) Tags: Isolation, Safe Workspace®, Safe Browser, Zero-day Protecting critical infrastructure has never been more important in today’s interconnected world. Cyber threats are becoming increasingly sophisticated, targeting
Read More >Enhancing SOHO Security with Application Isolation and CDR: A Guide for MSSPs
By BUFFERZONE Team, 15/07/2024
Target: IT Professionals (Elementary) Tags: Isolation, Safe Workspace®, Safe Browser, Zero-day Small Office/Home Office (SOHO) environments face significant cybersecurity challenges in today’s digital landscape. With limited resources and often needing
Read More >Stop Worrying and Start Isolating – Phishing Emails Abuse Windows Search Protocol
By BUFFERZONE Team, 24/06/2024
Target: IT Professionals (Elementary) Tags: Isolation, Safe Workspace®, Safe Browser, Zero-day, NoCloud™, Anti-Phishing In the ever-evolving landscape of cyber threats, a new phishing campaign has surfaced, leveraging the Windows
Read More >Stop Worrying and Start Isolating – EDR Bypassing Is a Real Threat
By BUFFERZONE Team, 19/06/2024
Target: IT Professionals (Elementary) Tags: Isolation, Safe Workspace®, Safe Browser, Zero-day In the evolving landscape of cybersecurity, Endpoint Detection and Response (EDR) systems have become crucial in identifying and mitigating
Read More >Stop Worrying and Start Isolating – 4th Zero-Day Exploit Discovered in May 2024
By BUFFERZONE Team, 3/06/2024
Target: IT Professionals (Elementary) Tags: Isolation, Safe Workspace®, Safe Browser, Zero-day In today’s digital landscape, the dangers posed by browser exploits are more pressing than ever, highlighting the critical need
Read More >Stop Worrying and Start Isolating – Limiting Removable Media Always Fails
By BUFFERZONE Team, 28/05/2024
Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace®, Safe Browsing, NoCloud™ Using portable media, such as USB drives, is paramount in enterprise cybersecurity. Nevertheless, these devices also potentially threaten sensitive
Read More >