The Beginners Guide – Reversing and Preventing the Invisible Malware and How CDR can improve Our Security (Part-3)
By BUFFERZONE Team, 25/01/2024
Target: Cybersecurity specialist Tags: JPEG, Image, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering, Protection by containment™ In this article, we venture into the intricacies of malicious malware attacks deployed
Read More >Unveiling the Threat: HTA Fileless Malware Propagating Through Spam Mail
By BUFFERZONE Team, 15/01/2024
Target: IT Professionals Tags: Malware, HTA, Zero-Trust, Isolation Introduction In the ever-evolving landscape of cybersecurity threats, malicious actors continually find innovative ways to infiltrate our digital lives. One such emerging
Read More >New Attack with the Same Story – The Need for Zero-Trust File Security
By BUFFERZONE Team, 11/01/2024
Target: IT Professionals Tags: Malware, Ransomware Zero-Trust, Safe Workspace™, Safe Browsing A recent phishing scheme has been detected using a Russian-language Microsoft Word document as a vehicle to distribute malware.
Read More >Zero-Day Threats: Terrifying, Yet Phishing Remains a Cost-Effective and Potent Cyber Attack Strategy
By BUFFERZONE Team, 8/01/2024
Target: IT Professionals (Elementary) Tags: Phishing, Safe Workspace™, Safe Browsing In the evolving landscape of cyber threats, deciding the optimal attack method to penetrate the organization is always challenging. In
Read More >Massive Phishing Onslaught Targets Facebook Messenger Business Users – Stop Rely on Detection Start Isolating
By BUFFERZONE Team, 12/10/2023
Target: IT Professionals Tags: Malware, Phishing, Zero-Trust, Isolation Cybercriminals have tapped into a vast network of fabricated and breached Facebook profiles, unleashing millions of deceptive Messenger messages aimed at Facebook
Read More >New Phishing Campaign Uses Lure Image with External Links to Drop Malware
By BUFFERZONE Team, 10/10/2023
Target: IT Professionals Tags: Anti-phishing, malware, isolation, Zero-trust Research from Fortinet FortiGuard Labs [1] found a new variation of phishing/luring attacks that work by sending a Microsoft Office OOXML (Office
Read More >