Close

Request Demo

BUFFERZONE is available to Enterprise companies only. Please fill out the form below and we’ll contact you shortly


    The Beginners Guide – Preventing the Invisible Malware What Is Steganalysis and How CDR can improve Our Security (Part-2)

    By BUFFERZONE Team, 31/07/2023

    Target: Consumers Tags:  Content Disarm and Reconstruction (CDR), Malware, Images, Steganography, Zero-Trust In our initial blog post, we explored the technique employed by malware authors to hide malicious code within

    Read More >

    What Can We Learn from VirusTotal Malware Trends Report 2023

    By BUFFERZONE Team, 27/07/2023

    Target: Consumers Tags:  Content Disarm and Reconstruction (CDR), Malware, Isolation, Safe Workspace®, Zero-Trust Several interesting trends were highlighted in the recent VirusTotal Malware Trends Report for July 2023. The report

    Read More >

    Digital Workspace Secured by Safe Workspace®

    By BUFFERZONE Team, 24/07/2023

    The rising trend of remote work and the inherent necessity for centralized management of an organization’s IT assets, including applications, data, and endpoints, has accentuated the need for a robust

    Read More >

    The Beginners Guide – Preventing the Invisible Malware How Steganography Works (Part-1)

    By BUFFERZONE Team, 20/07/2023

    Target: Consumers Tags:  Content Disarm and Reconstruction (CDR), Malware, Images, Steganography, Zero-Trust Throughout this blog series, we will delve into the following topics: understanding steganography (part 1), exploring steganalysis and

    Read More >

    BUFFERZONE® Safe Workspace® Prevention and Protection In MITRE® D3FEND™ Framework

    By BUFFERZONE Team, 17/07/2023

    Target: Consumers Tags:  MITRE® D3FEND™, MITRE® ATT&CK™, Safe Workspace®, CDR, Isolation In the ever-evolving landscape of cybersecurity, frameworks play a vital role in understanding and explaining how to defend against

    Read More >

    The beginner’s Guide To – OLE Malware Reverse Engineering Part 2

    By BUFFERZONE Team, 13/07/2023

    Target: Cybersecurity specialist Tags: OLE, PowerPoint, Excel, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering. In the second section, we introduced a fundamental approach to reverse-engineering a harmful OLE

    Read More >