Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    2023 will be the year of Zero Trust

    By BUFFERZONE Team, 1/03/2023

    Rising concern over the development of cybercrime has recently led several US federal agencies to adopt the Zero Trust concept of “never trust, always verify.” A recent memo published by

    Read More >

    The rise in USB-borne malware requires special attention

    By BUFFERZONE Team, 26/02/2023

    Using USB and other removable devices to carry out sophisticated cyberattacks is not usually the first thing that comes to mind when we think of cybercriminals, often believed to be

    Read More >

    APT malware spread illustrates need to add prevention to protect native endpoint

    By BUFFERZONE Team, 24/01/2023

    Advanced Persistent Threat (APT) attacks are becoming a growing threat to governments and other large institutions. APT malware is extremely vicious as it is hard to detect and can remain

    Read More >

    Microsoft Teams as a Command and Control Channel: How can organizations protect themselves from GIFShell attacks?

    By BUFFERZONE Team, 14/12/2022

    Most organizations focus on warning their employees to watch for and refrain from downloading malicious malware spread by emails. However, cybercriminals use many other methods to enter organizational networks. This

    Read More >

    How did US schools become cybercriminals favorite target and how can they protect themselves? 

    By BUFFERZONE Team, 24/11/2022

    It seems that these days nobody is secure, and cybercriminals are expanding their activities to sectors in which they showed no interest in the past. So, for example, the US

    Read More >

    The cost of false positive alerts, and how to avoid alert fatigue

    By BUFFERZONE Team, 7/10/2022

    Deception is one of the oldest war tactics, used since the times of the ancient Egyptians and Greeks. One of the most popular forms of deception is diverting the enemy’s

    Read More >