The beginners Guide To – Adobe PDF Malware Reverse Engineering Part 2
By BUFFERZONE Team, 15/06/2023
Target: Cybersecurity specialist Tags: Adobe PDF, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering In this blog we will continue the PDF malware analysis part –1 and continue to investigate
Read More >What can we learn from Verizon Data Breach Investigation Report (DBIR)
By BUFFERZONE Team, 12/06/2023
Target: Consumers Tags: Threat Intelligence, Malware, Phishing, Insider Threat, Vulnerabilities, Ransomware, Credentials The 2023 Data Breach Investigations Report (DBIR) by Verizon Business has yielded several important insights into the current
Read More >The beginners Guide To – Adobe PDF Malware Reverse Engineering Part 1
By BUFFERZONE Team, 8/06/2023
Target: Cybersecurity specialist Tags: Adobe PDF, Malware, Content Disarm and Reconstruction (CDR), Reverse Engineering An Adobe PDF (Portable Document Format) file is a file format developed by Adobe Systems. It
Read More >OneNote Malware Attack Prevention Using Content Disarm and Reconstruction
By BUFFERZONE Team, 5/06/2023
Target: Cybersecurity professionals Tags: Microsoft Office, OneNote, Content Disarm & Reconstruction, Zero-Trust Microsoft OneNote [1] is a versatile application included in the Microsoft Office suite, specifically designed for effortless information
Read More >Clipboard Hijacking attacks and How to Prevent Them
By BUFFERZONE Team, 1/06/2023
Target: IT Professionals Tags: Malware, Clipboard attack Computer clipboard hijacking attacks occur when an attacker gains unauthorized access to the clipboard of a computer to intercept or modify the data
Read More >Cryptojacking – What is it?
By BUFFERZONE Team, 30/05/2023
Target: Executives and business leaders Keywords: Coin miners, malware, bitcoin Cryptojacking is a type of cybercrime in which a hacker gains unauthorized access to a victim’s computer or device and
Read More >