Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    New Adobe Vulnerability Detected – How to Prevent the Next Zero-Day

    By BUFFERZONE Team, 2/10/2023

    Target: IT Professionals Tags: Malware, Vulnerability, Zero-Trust, CVE-2023-26369, Isolation Adobe has released security updates to address a zero-day vulnerability in Acrobat and Reader, identified as actively exploited in the wild.

    Read More >

    Security Made Simple -Prevent HTML Smuggling Attacks

    By BUFFERZONE Team, 7/09/2023

    Target: Consumers Tags: Zero-Trust, Isolation, Policy, Trust No File HTML smuggling [3] is a technique adversaries use to deliver malicious payloads to a target’s system by exploiting HTML5 features and

    Read More >

    What Are Adversarial Artificial Intelligence Attacks

    By BUFFERZONE Team, 5/09/2023

    Target: Consumers Tags:  Machine Learning, Deep Learning, Adversarial, Artificial Intelligence As we enter an era dominated by Artificial Intelligence (AI), new vulnerabilities are exposed, and new threat landscapes evolve. One

    Read More >

    Why EDR Alerts Aren’t Enough: The Case for BUFFERZONE® Safe Workspace™

    By BUFFERZONE Team, 30/08/2023

    The subject of discussion pertains to cybersecurity and the potential inadequacy of relying exclusively on Endpoint Detection and Response (EDR) alerts that are transmitted to a Security Information and Event

    Read More >

    The Beginner’s Guide To – OOXML Malware Reverse Engineering Part 1

    By BUFFERZONE Team, 24/08/2023

    Target: Cybersecurity specialist Tags: OOXML, Word, PowerPoint, Excell, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering, Zero-Trust. Microsoft Office Open XML (OOXML) used from the 2007 version of Office documents

    Read More >

    The Beginner’s Guide To – RTF Malware Reverse Engineering Part 2

    By BUFFERZONE Team, 21/08/2023

    Target: Cybersecurity specialist Tags: RTF, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering, Zero-Trust. In this second blog post we will focus on RTF file analysis with RTFOBJ from

    Read More >