Following a Trail of Confusion: PowerShell in Malicious Office Documents

2018-10-02T11:44:52+00:00October 2nd, 2018|Threats|

While the threat landscape continues to evolve, Microsoft Office documents continue to see steady usage by malicious actors. These documents, often times equipped with nothing more than the built-in capability offered by the macros, are continuously leveraged to gain a foothold into the enterprise. And why shouldn’t they? Macros provide a broad range of powerful [...]

Platform Criminality Aids Sales of Exploits and IP

2018-09-13T15:17:03+00:00September 13th, 2018|Threats|

Platform criminality is enabling and incentivising insider threats to sell on corporate IP and potent malware Understanding cybercrime platforms is key to disrupting the supply of hacking tools and IP theft Platform criminality has been reshaping the way in which the security industry thinks about cybercrime. It’s made the sale and purchase of cybercrime tools, [...]

Data Talks: Download Attacks Ignite While Attachments Cool Their Heels

2018-08-30T07:38:33+00:00August 30th, 2018|Threats|

Bromium customers see a significant increase in attacks via downloads as compared to email attachments "Compound attacks" are increasingly common, with cybercriminals employing multiple attack vectors in tandem No matter how the threats arrive, it’s critical to secure their ultimate targets, the vulnerable applications Welcome to the third edition of the Bromium Threat Labs Data [...]

Data Talks: The Big Shift to File-Based Attacks Scrambles the Security Industry

2018-08-22T09:27:13+00:00August 22nd, 2018|Threats|

Bromium sees a dramatic drop in the percentage of browser-based attacks in 2018 compared to file-based attacks Microsoft’s legacy Internet Explorer is now the only major web browser with serious remaining security concerns The clear majority of threats reaching endpoints today arrive via email attachments and browser file downloads Welcome to the second installment of [...]

Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point

2018-08-01T19:12:37+00:00August 2nd, 2018|Threats|

Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat research using aggregated data voluntarily reported by Bromium customers Look for deep-dives, trends, and predictions to guide you when you know that detection isn’t enough to keep you safe Today we’re kicking off a new [...]

Protection First Strategy: Application Isolation as the Last Line of Defense

2018-07-24T09:13:17+00:00July 24th, 2018|Threats|

Endpoint security is a top priority for enterprise organizations and government agencies, but despite gains in detection-based tools, cybercriminals continue to find ways to bypass layered defenses Relying on detection-based solutions alone will not protect your systems and infrastructure from attacks New approaches, such as virtualization, can provide the desperately needed last line of defense [...]

Malware & Fileless Malware: How It’s Created, How It Spreads, and What To Do About It [On-Demand Webinar]

2018-07-20T17:47:52+00:00July 19th, 2018|Threats|

In this Dark Reading webinar, experts in cybersecurity share their views on what’s going on with malware, and how it evolves to outsmart even your most elaborate defenses Hear about the growing proliferation of “fileless malware” — malware that uses trusted programs in sinister ways, instead of delivering the usual malicious payloads — and find [...]

Protecting your Enterprise from Business Email Compromise

2018-07-20T17:47:59+00:00May 21st, 2018|Threats|

Business Email Compromise (BEC) is a growing threat that has resulted in companies losing billions of dollars since 2013 BEC starts with spear phishing and traditional attacks to install spyware Bromium prevents attackers from getting their first foot in the door Within Bromium, the acronym BEC stands for the Bromium Enterprise Controller that’s used to [...]

Dissecting the POP SS Vulnerability

2018-05-17T02:00:38+00:00May 17th, 2018|Threats|

The newly uncovered POP SS vulnerability takes advantage of a widespread misconception about behaviour of pop ss or mov ss  instructions resulting in exceptions when the instruction immediately following is an interrupt. It is a privilege escalation, and as a result it assumes that the attacker has some level of control over a userland process [...]

Phone the Sender – Best or Worst New Security Practice?

2018-07-25T11:05:45+00:00April 30th, 2018|Threats|

Sophisticated phishing attacks may originate from compromised email accounts of legitimate business partners New "best practice" security recommendation is to phone the sender whenever an unexpected attachment arrives Bromium isolates each email attachment so that users can click with confidence and maximize their productivity Do you receive a lot of email attachments from people you [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close