News2018-08-23T20:32:25+00:00
08.01.2018
Is it Finally Bromium’s Hour?
Bromium’s new offering – Protected App – is targeted at safeguarding intellectual property and HVAs from threats such as keylogging, kernel exploits, memory and disk tampering, and man-in-the-middle attacks, with sensitive applications walled off from the endpoint.
Read More
08.01.2018
Bromium evolves virtulisation-based security
Bromium has evolved its technology to offer bidirectional protection for applications and underlying operating systems.
Read More
08.01.2018
Virtualization tool helps protect critical IP and high value assets
Bromium has announced a new product called Protected App, which allows organizations to establish robust, end-to-end protection around their critical intellectual property (IP) and high value assets (HVAs).
Read More
08.01.2018
Bromium Readies New Protected App Offer
For partners who got on board with Bromium’s new partner program, introduced almost 18 months ago, get ready for Protected App, Bromium’s latest offer.
Read More
08.01.2018
Bromium Announces Protected App for Hardware-Isolated Security
Bromium is launching its new Protected App offering, which will help secure applications inside of a hardware-isolated virtualization hypervisor.
Read More
07.31.2018
Application isolation and control – a modern defence for new threat
Virtualisation allows applications to open and carry out each task in its own self-contained virtual environment so any threat caused by an action in this environment won’t have access to anywhere else.
Read More
07.20.2018
Huge Singapore data breach shows need for new approach
A major data breach in Singapore underlines the need for a new approach to protecting critical data and applications, say security experts.
Read More
07.12.2018
Cyber attacks bought ‘as easily as online shopping’
The platform economy — connecting buyers with sellers via the internet — has enabled companies such as Amazon, eBay, Uber and Airbnb to build vast global businesses. Now cyber criminals are using the same technique, and even the same platforms, to buy and sell their tools.
Read More
07.12.2018
GUEST ESSAY: Theft of MQ-9 Reaper docs highlights need to better protect ‘high-value assets’
It’s important that the government and private companies find solutions for consolidating and protecting HVAs. The goal should be to ensure isolation and integrity, thwarting attempts to access and/or laterally move data from HVAs remotely.
Read More
07.12.2018
Hacker Compromises Air Force Captain to Steal Sensitive Drone Info
A hacker has penetrated an Air Force captain’s computer to steal sensitive information about U.S. military drones and other state secrets, according to a cybersecurity firm’s investigation of dark web activities.
Read More
07.12.2018
Hacker Exploits 2-Year Old Router Issue To Steal Sensitive US Military Data
A moderately skilled hacker managed to steal export-restricted data pertaining to the Reaper drone and Abrams tank from computers belonging to two US Army officials.
Read More
06.28.2018
Don’t get owned – what to consider when investing in security tools
While it is important to invest in layered defenses and protect against opportunistic, known threats, investing in these tools alone will never provide the protection needed to defend against today’s advanced threats.
Read More
06.04.2018
Bromium Revamps Endpoint Security Strategy to Focus on Channel
Bromium announces updates to its Partner Network that add dedicated sales, marketing, and technical support to channel partners. Bromium also announces it is now committed to a 100 percent indirect sales model.
Read More
06.01.2018
Bromium Go-To-Market restructured to better support mid-market enterprise
Bromium has announced the release of Bromium Secure Platform 4.1. The release provides out-of-the-box use case support to address key organisational pain points, including email attachment protection; spear phishing protection and malicious download protection.
Read More
06.01.2018
Bromium offers virtualisation to the masses with targeted use cases
Bromium has announced the release of Bromium Secure Platform 4.1.
Read More
05.31.2018
Bromium Secure Platform 4.1 Boosts Virtualization-Based Security
Bromium updates its micro virtual machine-based security platform to make it easier to secure organizations from email and web threats
Read More
05.31.2018
Bromium shifts to indirect sales model
Bromium reveals its efforts to shift to an indirect sales model in North America
Read More
05.31.2018
Bromium unveils new ‘one-click’ solution for partners
Bromium has announced the release of its Secure Platform 4.1, which offers one-click solutions to resellers
Read More
05.23.2018
Champions League final broadcast could be under threat from a ‘sophisticated’ new malware strain spreading across Ukraine, security experts warn
Hackers could be preparing to bring down the Champions League final broadcast, and experts warn that this may be the perfect opportunity to inflict maximum chaos and gain exposure.
Read More
05.17.2018
Cyberlaundering: from ghost Uber rides to gibberish on Amazon
Digital laundering funds terror and will ‘double by 2020’ – and the UN’s anti-crime chief says it must be tackled
Read More
05.14.2018
NCA: Organised Cybercrime Continues to Rise
Technology is a key driver and enabler of organized crime, offering new opportunities for cyber-criminals, with encryption and dark web
Read More
05.11.2018
Is Cybercrime Getting Out of Control?
Cybercrime is reaching a critical point, and we need to better understand its magnitude
and how it affects us as we use the internet
Read More
05.10.2018
Industry Reactions to Iran Cyber Retaliation Over U.S. Nuclear Deal Exits
Many industry professionals say that there is a strong possibility of attacks following U.S. withdrawal from the Iran nuclear deal
Read More
04.25.2018
Europol Smacks Down World’s Largest DDoS-for-Hire Market
A multi-national investigation led by Europol has led to the arrest of the administrators of the DDoS-for-hire site, which sold the capability to knock websites offline and take down domains for as little as $18 per month.
Read More
04.25.2018
Major Takedown of Site Selling Cyberattacks
Administrators of the world’s largest DDoS-as-a-service website webstresser.org are under arrest thanks to the cooperative effort of international law enforcement agencies
Read More
04.25.2018
Dutch Police & NCA lead takedown of world’s largest DDoS marketplace
Operation Power Off, led by the Dutch Police and the UK’s National Crime Agency, led to arrests of the administrators of DDoS marketplace webstresser.org
Read More
04.20.2018
Cybercrime Economy Generates $1.5 Trillion a Year
Threat actors generate, launder, spend, and reinvest more than $1.5 trillion in illicit funds, according to a new study on cybercrime’s ‘web of profit.’
Read More
04.20.2018
Cyber crime “generates $1.5tn every year”
Cyber crime generates £1.1tn in revenue every year, according to a groundbreaking report released at the 2018 RSA Conference
Read More
04.20.2018
Ransomware, stolen data or malware: How do online crooks really make their money?
The cybercriminal economy has hit global revenues of $1.5 trillion a year, according to a study which shows the vast scale of cybercrime and how profits are acquired, laundered, spent and reinvested.
Read More
04.20.2018
Cyber Criminals earn $1.5 trillion through Amazon, Facebook and Instagram Exploitation
New study reveals the cyber crime economy is equivalent to the GDP of Russia
Read More
04.11.2018
Cyber criminals earn up to £1.4 million a year each and are ‘rarely caught’s
Top cyber criminals earn up to £1.4 million a year each – the same level as top CEOs – according to a study sponsored by Bromium
Read More
04.11.2018
Study: Cybercriminals love fine art, fast cars and absorbent diapers
A recent academic study and dark web investigation found that elite cybercriminals can typically make up to $2 million per year.
Read More
04.10.2018
Cyber criminals earn up to $2m a year, study shows
Cyber criminals are acquiring, laundering, spending and reinvesting about $1.5tn in profits a year, research has revealed
Read More
03.23.2018
Weekly Threat Report 23rd March 2018
A joint report between Surrey University and researchers at security vendor Bromium estimates that the proceeds of cyber crime make up to 8-10% of total illegal profits laundered globally, believed to be valued at up to $200 billion.
Read More
03.19.2018
Bitcoin is leading to a huge upswing in money laundering, new research says
Cybercriminals are turning to cryptocurrencies like Bitcoin to convert illegal revenue into clean cash, new research shows.
Read More
03.19.2018
Cybercriminals Launder Up to $200B in Profit Per Year
Cybercrime funds make up 8-10% of all illegal profits laundered and amount to $80-200 billion each year.
Read More
03.19.2018
Criminal’s Report Shows Bitcoin Fall Out
The value of the number one digital currency, bitcoin, has lately been on a punishing tailspin, falling by approximately 40 percent in 2018 and over 70 percent from the time when it was at the peak in December 2017.
Read More
03.17.2018
Podcast Episode 88: Inside Russia’s DragonFly Group and How Cyber Crooks Launder Money
In this week’s Security Ledger Podcast (#88) we do a deep dive with researcher Vikram Thakur of the firm Symantec on “Dragonfly,” the Russian hacking group whose actions prompted the U.S. Department of Homeland Security and the FBI to issue a joint statement last week warning of intrusions into critical infrastructure in the US.
Read More
03.16.2018
Crooks opt for Monero as crypto of choice to launder ill-gotten gains
Crooks are increasingly turning to Monero over Bitcoin, according to a new study on the economics of cybercrime.
Read More
03.16.2018
Virtual cash helps cyber-thieves launder money, research suggests
Crypto-currencies and digital cash systems have become a key way for cyber-thieves to launder stolen funds, suggests research.
Read More
03.16.2018
Bitcoin Loses Corporate and Criminal Friends
From analysts to cybercriminals and even fintechs, is Bitcoin falling from favour?
Read More
03.16.2018
Cyber criminals using complex financial system, study shows
Cyber criminals are using a combination of new cryptocurrencies, gaming currencies and micro-payments to launder up to $200bn in ill-gotten gains, research has revealed
Read More
03.16.2018
Your personal data may be on the dark web: What you need to know
Major data breaches at banks and sites like Yahoo – where about 3 billion accounts were compromised – mean that your personal data can travel to the dark web, networks of encrypted, often shadowy, websites that are not indexed by common search engines. In fact, the dark web is so different that you typically need special software to use it.
Read More
02.22.2018
The global cyber war is heating up: Why businesses should be worried
From NotPetya’s global disruption to North Korea’s digital plundering of financial institutions, state-sponsored cyber attacks should be top of mind for business leaders. Here’s how to defend against them.
Read More
02.21.2018
Russian Twitter Trolls Exploit Florida School Shooting
Within an hour of the shooting at a Florida High School last week, divisive messages began pouring out of Twitter accounts believed to be controlled by Russia.
Read More
02.09.2018
DarkSky botnet spotted evading security measures
A new botnet has been discovered by security researchers that has anti-virtual machine capabilities to evade security controls such as a sandbox.
Read More
02.06.2018
Bromium issues warning about ‘hidden costs’ of detection-based security
SOC teams spend more than £11 million per year triaging threats
Read More
02.06.2018
Report: Traditional cybersecurity costs enterprises a fortune and isn’t helping that much
It’s time to move away from the reactive detect-to-protect cybersecurity model, says security firm Bromium.
Read More
02.06.2018
£12m pa – the hidden costs of maintaining endpoint security solutions
Enterprises across the globe are now investing heavily in licensing and deployment of endpoint security solutions to protect their IT systems but fail to spot hidden costs of human skills and effort required.
Read More
02.06.2018
Enterprises spend more than $16 million on hidden costs of detection-based security
Most organizations employ some kind of detection-based security to protect their systems. But a new report by cyber security company Bromium reveals that this approach has major hidden costs.
Read More
01.29.2018
Business cyber crime up 63%, UK stats show
Despite an overall decrease in fraud and computer misuse in 2017, the latest Office for National Statistics (ONS) reports show that incidents involving computer misuse and malware against business are way up
Read More
01.03.2018
Computers face global slowdown due to flaw in Intel chips
Certain computer tasks could be up to 50% slower because of a fix for a security flaw discovered in Intel microprocessors.
Read More
01.03.2018
“Major ‘design flaw’ in Intel processors made in the last decade could expose your private passwords to hackers and slow down your PC by 50%
A massive security flaw thought to affect millions of computers has been discovered in the design of Intel’s processors, which could give hackers your passwords.
Read More
11.27.2017
New ransomware family exploiting poor security in remote desktop services
Researchers have uncovered a new ransomware family that is exploiting poor security credentials in remote desktop services and encrypting files.
Read More
11.27.2017
92 Percent of IT Pros Say Employees Try to Access Inappropriate Information
A recent survey of more than 900 IT security professionals found that 92 percent of respondents said employees attempt to access information they don’t need for their day-to-day wo …
Read More
11.27.2017
Met provides cyber pros with new forensic analysis tool
The London Metropolitan Police Service is kitting out its team of cyber security experts with a new set of real-time forensic analysis tools. On Thursday, the Met confirmed it team …
Read More
11.27.2017
Enterprise security budgets slashed by a third; is spend appropriate?
Enterprises seem to be getting the message, at last, that security posture cannot be measured by pocket depth as budgets get cut by a third.
Read More
11.27.2017
Free yet illegal Premier League and Game of Thrones streams could help criminals steal your money using malware
Free illegal streams of films, TV shows and sports fixtures could end up costing you a lot, cyber security experts have warned.
Read More
11.27.2017
Cybersecurity thwarts productivity and innovation, report says
While essential, security is compromising the adoption of new technologies and practices, according to a majority of chief information security officers in large organizations.
Read More
11.27.2017
We’re opening up Call for Papers for the next set of GeekOut 365 videos!
It’s been a few months since the initial release of GeekOut 365, and now it’s time to add to our library of independent, community-led, expert videos.
Read More
11.27.2017
74% of CISOs Say Users Are Frustrated That Security Disrupts Productivity
Help desks spend days dealing with user access complaints, while legitimate work gets blocked by over-zealous security tools.
Read More
11.24.2017
Necurs used to infect computers with Scarab ransomware
A new strain of ransomware has been discovered that is being distributed by the Necurs botnet, according to security researchers.
Read More
11.09.2017
Why does China spot security vulnerabilities quicker than the US?
In a world of state-sponsored hackers, highly motivated cybercrime gangs and determined hacktivists, mitigating software vulnerabilities is an essential part of the job for IT security teams.
Read More
11.09.2017
ICO Finds Only 20% Of UK Citizens Trust Companies With Their Data
The ICO has just announced the findings of a survey which shows that only 20% of UK citizens trust companies with the storing of their data.
Read More
11.08.2017
Widespread usage of admin rights leaving organisations vulnerable to cyber attacks
Organisations are allowing too many employees to enjoy admin rights to promote efficiency and convenience, but are, in the process, making themselves vulnerable to insider threats, phishing attacks, and ransomware infections.
Read More
11.07.2017
ICO: Only 20% of UK citizens trust companies with their data
Only one-fifth of UK citizens trust companies to securely store their personal information, according to a survey published yesterday by the Information Commissioner’s Office (ICO).
Read More
11.06.2017
Bromium helps London’s Metropolitan Police
The Metropolitan Police Cybercrime Unit (FALCON) has deployed Bromium to rapidly investigate and mitigate cybercrime impacting businesses and the public in London.
Read More
11.03.2017
Cyber forensics by Met
The Metropolitan Police Cybercrime Unit FALCON has deployed a cyber forensics product to investigate and mitigate cybercrime against businesses and the public in London.
Read More
11.02.2017
Met outfits cyber crime unit with real-time malware analysis tools
The London Metropolitan Police Service is set to provide its cybercrime taskforce with new real-time forensic analysis tools, the force announced today.
Read More
11.02.2017
Bromium swoops in to fight cybercrime with Met Police FALCON unit
Taking the fight to the cybercriminals, the Metropolitan Police has enlisted the support of security firm Bromium, arming the FALCON cybercrime unit for the battle ahead.
Read More
11.02.2017
Met Police widens cybercrime expertise with Bromium partnership
London’s Metropolitan Police is set to significantly boost its anti-cybercrime capabilities thanks to a new partnership with security firm Bromium.
Read More
11.02.2017
The Met is deploying Bromium’s analysis tool to investigate cyber attacks in real-time
The Met Police’s cyber crime unit has deployed Bromium’s real-time analysis tool to assist with the investigation of attacks on businesses and individuals in London.
Read More
11.02.2017
Police use virtual ‘cage’ to corral malware and probe cybercrime evidence
As law enforcement faces limited resources to investigate growing levels of cybercrime, the Metropolitan Police has brought in specialist technology to support its digital investigations.
Read More
11.02.2017
Met outfits cyber crime unit with real-time malware analysis tools
The London Metropolitan Police Service is set to provide its cybercrime taskforce with new real-time forensic analysis tools, the force announced today.
Read More
11.02.2017
Bromium swoops in to fight cybercrime with Met Police FALCON unit
Taking the fight to the cybercriminals, the Metropolitan Police has enlisted the support of security firm Bromium, arming the FALCON cybercrime unit for the battle ahead.
Read More
11.02.2017
Police use virtual ‘cage’ to corral malware and probe cybercrime evidence
As law enforcement faces limited resources to investigate growing levels of cybercrime, the Metropolitan Police has brought in specialist technology to support its digital investigations.
Read More
10.31.2017
B2B Challenge: Running The Security Gauntlet
Want something to be scared of today? Here’s two things that should frighten the life out of B2B emailers:
  1. Employees are paying ransomware in ever-increasing numbers.
  2. Security systems are getting so tight that they are preventing employees from accessing websites and even doing their work.
Read More
10.27.2017
Survey Roundup: IT Increasingly Seeking Soft Skills Over Tech Expertise
A look at some recent surveys and reports dealing with risk and compliance issues.
Read More
10.27.2017
Survey Roundup: IT Increasingly Seeking Soft Skills Over Tech Expertise
A look at some recent surveys and reports dealing with risk and compliance issues.
Read More
10.27.2017
Isolieren statt erkennen: neue Wege der IT-Sicherheit
Seit Langem versuchen sich Unternehmen, Ämter und Behörden gegen Cyber-Angriffe zur Wehr zu setzen. Der Erfolg bleibt allerdings überschaubar, wie immer neue Sicherheitsvorfälle belegen.
Read More
10.24.2017
Cyber-Sec pros targeted: NATO cyber-conflict event in cyber-conflict
In a stroke of ironical genius, Russian hackers have targeted security conference attendees with a targeted phishing campaign.
Read More
10.23.2017
CISO Survey: End Users See Security as a Hurdle to Innovation
Traditional approaches to security are leading to frustrated users and strained relationships between workers and IT departments, according to the findings of a survey of chief information security officers (CISOs).