The Beginners Guide – Preventing the Invisible Malware How Steganography Works (Part-1)
By BUFFERZONE Team, 20/07/2023
Target: Consumers Tags: Content Disarm and Reconstruction (CDR), Malware, Images, Steganography, Zero-Trust Throughout this blog series, we will delve into the following topics: understanding steganography (part 1), exploring steganalysis and
Read More >BUFFERZONE® Safe Workspace® Prevention and Protection In MITRE® D3FEND™ Framework
By BUFFERZONE Team, 17/07/2023
Target: Consumers Tags: MITRE® D3FEND™, MITRE® ATT&CK™, Safe Workspace®, CDR, Isolation In the ever-evolving landscape of cybersecurity, frameworks play a vital role in understanding and explaining how to defend against
Read More >The beginner’s Guide To – OLE Malware Reverse Engineering Part 2
By BUFFERZONE Team, 13/07/2023
Target: Cybersecurity specialist Tags: OLE, PowerPoint, Excel, Word, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering. In the second section, we introduced a fundamental approach to reverse-engineering a harmful OLE
Read More >Big Head Ransomware Fake Windows Update Alert- What Can We Do?
By BUFFERZONE Team, 11/07/2023
Target: IT Professionals Tags: Malware, Ransomware Zero-Trust Ransomware remains a significant cybersecurity concern, posing threats to personal and enterprise data. The Big Head Ransomware is a new entrant into the
Read More >Fileless Malware Attacks Are on the Rise- But Do not Worry
By BUFFERZONE Team, 6/07/2023
Target: Consumers Tags: Fileless Malware, Bypass antivirus, Isolation, CDR The cybersecurity arena experienced significant evolution in 2020, marked by a substantial rise in fileless malware attacks. The rate skyrocketed to
Read More >The Beginners Guide to Chrome Extension Research
By BUFFERZONE Team, 2/07/2023
Target: Cybersecurity specialist Tags: CRX, Chrome Extension, Malware, Reverse Engineering. A Chrome extension is a small software program that enhances the functionality of the Google Chrome browser. Extensions are made
Read More >