Stop Worrying and Start Isolating – Protecting Industrial Control System (ICS)
By BUFFERZONE Team, 22/07/2024
Target: ICS Professionals (Elementary) Tags: Isolation, Safe Workspace®, Safe Browser, Zero-day Protecting critical infrastructure has never been more important in today’s interconnected world. Cyber threats are becoming increasingly sophisticated, targeting
Read More >Enhancing SOHO Security with Application Isolation and CDR: A Guide for MSSPs
By BUFFERZONE Team, 15/07/2024
Target: IT Professionals (Elementary) Tags: Isolation, Safe Workspace®, Safe Browser, Zero-day, Protection by containment™ Small Office/Home Office (SOHO) environments face significant cybersecurity challenges in today’s digital landscape. With limited resources
Read More >Stop Worrying and Start Isolating – Phishing Emails Abuse Windows Search Protocol
By BUFFERZONE Team, 24/06/2024
Target: IT Professionals (Elementary) Tags: Isolation, Safe Workspace®, Safe Browser, Zero-day, NoCloud™, Anti-Phishing, Protection by containment™ In the ever-evolving landscape of cyber threats, a new phishing campaign has surfaced,
Read More >Stop Worrying and Start Isolating – EDR Bypassing Is a Real Threat
By BUFFERZONE Team, 19/06/2024
Target: IT Professionals (Elementary) Tags: Isolation, Safe Workspace®, Safe Browser, Zero-day, Protection by containment™ In the evolving landscape of cybersecurity, Endpoint Detection and Response (EDR) systems have become crucial in
Read More >Stop Worrying and Start Isolating – 4th Zero-Day Exploit Discovered in May 2024
By BUFFERZONE Team, 3/06/2024
Target: IT Professionals (Elementary) Tags: Isolation, Safe Workspace®, Safe Browser, Zero-day, Protection by containment™ In today’s digital landscape, the dangers posed by browser exploits are more pressing than ever, highlighting
Read More >Stop Worrying and Start Isolating – Limiting Removable Media Always Fails
By BUFFERZONE Team, 28/05/2024
Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace®, Safe Browsing, NoCloud™, Protection by containment™ Using portable media, such as USB drives, is paramount in enterprise cybersecurity. Nevertheless, these devices also
Read More >