Data Talks: Why Customers Trust Bromium to Let Malware Run on their Endpoints

2018-12-05T08:16:28+00:00December 5th, 2018|Threats|

Bromium customers enthusiastically choose to let malware keep running in isolated micro-VMs 86% of the time This seemingly counterintuitive approach maximizes threat intelligence, made possible only by virtualization-based security Traditional solutions try to terminate malware upon discovery to minimize breaches, but often act too late and sacrifice learning Let malware run. All of it. Ransomware, [...]

Catch Me If You Can: The Changing Faces of Malware

2018-11-14T08:03:56+00:00November 14th, 2018|Threats|

The reappearance of malware variants shows how platform criminality is enabling hackers to teach old code new tricks The security industry and authorities need to work together to understand how platforms are being used to resurrect malware New malware is constantly emerging into the ever-growing threat landscape, and the diversity and number of attacks that [...]

Data Talks: Deeper Down the Rabbit Hole: Second-Stage Attack and a Fileless Finale

2018-12-05T08:17:22+00:00November 5th, 2018|Threats|

­­In our last blog, “Following a Trail of Confusion: PowerShell in Malicious Office Documents”, we systematically unraveled multiple layers of obfuscation initiated by a weaponized first-stage Microsoft Word document to reveal a surreptitious download script and a malicious second-stage binary file dropped onto the victim PC. For those who wish to follow the analysis through [...]

How Hackers Exploit Online Games

2018-10-29T16:46:16+00:00October 31st, 2018|Threats|

Legitimate platforms like online gaming services are a breeding ground for hackers, with in-game currencies and micro-transactions putting a target on the gaming industry’s back Online games have also provided a testing ground for hackers keen to test their malware on unsuspecting players Hackers taking advantage of social networks like LinkedIn is nothing new in [...]

Browser Isolation Eliminates Risk in Context

2018-10-30T05:56:42+00:00October 30th, 2018|Threats|

Browser isolation: Secure, user-centric browsing isolates phishing links, plus high-risk and lightly-trafficked websites Context awareness preserves native browsing for low-risk websites and trusted online enterprise resources Browser isolation fully quarantines web downloads, which comprise most attacks, yet are handled poorly by remote browsing proxies Everyone wants a safe web browsing experience, but nobody likes overprotective [...]

Data Talks: Following a Trail of Confusion: PowerShell in Malicious Office Documents

2018-12-05T08:33:24+00:00October 2nd, 2018|Threats|

While the threat landscape continues to evolve, Microsoft Office documents continue to see steady usage by malicious actors. These documents, often times equipped with nothing more than the built-in capability offered by the macros, are continuously leveraged to gain a foothold into the enterprise. And why shouldn’t they? Macros provide a broad range of powerful [...]

Platform Criminality Aids Sales of Exploits and IP

2018-09-13T15:17:03+00:00September 13th, 2018|Threats|

Platform criminality is enabling and incentivising insider threats to sell on corporate IP and potent malware Understanding cybercrime platforms is key to disrupting the supply of hacking tools and IP theft Platform criminality has been reshaping the way in which the security industry thinks about cybercrime. It’s made the sale and purchase of cybercrime tools, [...]

Data Talks: Download Attacks Ignite While Attachments Cool Their Heels

2018-08-30T07:38:33+00:00August 30th, 2018|Threats|

Bromium customers see a significant increase in attacks via downloads as compared to email attachments "Compound attacks" are increasingly common, with cybercriminals employing multiple attack vectors in tandem No matter how the threats arrive, it’s critical to secure their ultimate targets, the vulnerable applications Welcome to the third edition of the Bromium Threat Labs Data [...]

Data Talks: The Big Shift to File-Based Attacks Scrambles the Security Industry

2018-08-22T09:27:13+00:00August 22nd, 2018|Threats|

Bromium sees a dramatic drop in the percentage of browser-based attacks in 2018 compared to file-based attacks Microsoft’s legacy Internet Explorer is now the only major web browser with serious remaining security concerns The clear majority of threats reaching endpoints today arrive via email attachments and browser file downloads Welcome to the second installment of [...]

Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point

2018-08-01T19:12:37+00:00August 2nd, 2018|Threats|

Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat research using aggregated data voluntarily reported by Bromium customers Look for deep-dives, trends, and predictions to guide you when you know that detection isn’t enough to keep you safe Today we’re kicking off a new [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close