Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    Microsoft Teams as a Command and Control Channel: How can organizations protect themselves from GIFShell attacks?

    By BUFFERZONE Team, 14/12/2022

    Most organizations focus on warning their employees to watch for and refrain from downloading malicious malware spread by emails. However, cybercriminals use many other methods to enter organizational networks. This

    Read More >

    How did US schools become cybercriminals favorite target and how can they protect themselves? 

    By BUFFERZONE Team, 24/11/2022

    It seems that these days nobody is secure, and cybercriminals are expanding their activities to sectors in which they showed no interest in the past. So, for example, the US

    Read More >

    The cost of false positive alerts, and how to avoid alert fatigue

    By BUFFERZONE Team, 7/10/2022

    Deception is one of the oldest war tactics, used since the times of the ancient Egyptians and Greeks. One of the most popular forms of deception is diverting the enemy’s

    Read More >

    Plugin devices expose hospitals’ Achilles heel, requiring new approach 

    By BUFFERZONE Team, 11/09/2022

    The healthcare industry is one of cybercriminals’ favorite targets, for obvious reasons. Hospitals store a large quantity of highly confidential data and need to protect themselves against a situation in

    Read More >

    Open Redirection: What is this phishing technique, and how do I defend against it?

    By BUFFERZONE Team, 5/09/2022

    Computer users are long accustomed to receiving emails notifying them of exciting business opportunities, great inheritances, lottery wins, packages that are waiting for them and many other such messages that

    Read More >

    Return to office does not eliminate need for secure working environment anywhere

    By BUFFERZONE Team, 30/08/2022

    The shift to remote working exposes organizations to new ransomware threats. Companies must not rely on their employees to take required security measures, and need to offer them a protected

    Read More >