Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly

    Massive Phishing Onslaught Targets Facebook Messenger Business Users – Stop Rely on Detection Start Isolating

    By BUFFERZONE Team, 12/10/2023

    Target: IT Professionals Tags: Malware, Phishing, Zero-Trust, Isolation Cybercriminals have tapped into a vast network of fabricated and breached Facebook profiles, unleashing millions of deceptive Messenger messages aimed at Facebook

    Read More >

    New Phishing Campaign Uses Lure Image with External Links to Drop Malware

    By BUFFERZONE Team, 10/10/2023

    Target: IT Professionals Tags: Anti-phishing, malware, isolation, Zero-trust Research from Fortinet FortiGuard Labs [1] found a new variation of phishing/luring attacks that work by sending a Microsoft Office OOXML (Office

    Read More >

    New Adobe Vulnerability Detected – How to Prevent the Next Zero-Day

    By BUFFERZONE Team, 2/10/2023

    Target: IT Professionals Tags: Malware, Vulnerability, Zero-Trust, CVE-2023-26369, Isolation Adobe has released security updates to address a zero-day vulnerability in Acrobat and Reader, identified as actively exploited in the wild.

    Read More >

    Security Made Simple -Prevent HTML Smuggling Attacks

    By BUFFERZONE Team, 7/09/2023

    Target: Consumers Tags: Zero-Trust, Isolation, Policy, Trust No File HTML smuggling [3] is a technique adversaries use to deliver malicious payloads to a target’s system by exploiting HTML5 features and

    Read More >

    What Are Adversarial Artificial Intelligence Attacks

    By BUFFERZONE Team, 5/09/2023

    Target: Consumers Tags:  Machine Learning, Deep Learning, Adversarial, Artificial Intelligence As we enter an era dominated by Artificial Intelligence (AI), new vulnerabilities are exposed, and new threat landscapes evolve. One

    Read More >

    Why EDR Alerts Aren’t Enough: The Case for BUFFERZONE® Safe Workspace™

    By BUFFERZONE Team, 30/08/2023

    The subject of discussion pertains to cybersecurity and the potential inadequacy of relying exclusively on Endpoint Detection and Response (EDR) alerts that are transmitted to a Security Information and Event

    Read More >