You are here

Endpoint Protection and Endpoint Security Reports

Endpoint Exploitation Trends 1H 2016

The first half of 2016 has seen new developments and interesting trends in the way bad actors and malware authors have adapted to better exploit the current digital landscape. This report provides guidance on both. 

Endpoint Exploitation Trends 2015

In this report, Bromium examines cyber security trends from 2015, including vulnerabilities, exploits, malvertising, ransomware and macro malware. Key findings include the vulnerability of Flash, the ubiquity of malvertising, the resurgence of macro malware and the explosive growth of ransomware.

Black Hat 2015: State of Security

This report highlights security trends identified by more than 100 information security professionals who attended Black Hat 2015. Key findings include the endpoint as the source of greatest risk, critical infrastructure at risk of cyber attack and issues with Flash.

Endpoint Exploitation Trends 1H 2015

In this research report, Bromium analyzes the ongoing security risk of popular websites and software. The report highlights that more than 50 percent of malvertising is unknowingly hosted on news and entertainment websites, Flash exploits have increased 60 percent in the past six months, and the growth of ransomware families has doubled each year since 2013.

Endpoint Protection Attitudes & Trends 2015

End users continue to be the greatest security risk, thanks to their tendency to click on malicious email and URLs, resulting in compromised endpoints, according to this Bromium survey. Security professionals agree that this poses challenges as they struggle to manage multiple point solutions, respond to the security alerts generated by users, and detect and remediate compromised endpoints.

Understanding Crypto-Ransomware

Crypto-ransomware, including variants CryptoLocker and CryptoWall, shows no sign of abating since traditional detection-based security, such as antivirus, is ineffective at stopping this threat. Crypto-ransomware encrypts files, locking them from user access, until a ransom is paid. In this report, Bromium dissects nearly 30 samples of ransomware, revealing the increasing sophisticated tactics being used.

Optimized Mal-Ops: Hack the Ad Networks like a Boss

From an attacker’s perspective, ad networks are no different and may even be better than exploit kits. They are viable candidates as the next primary attack vector. An in-depth analysis of malicious Web ads reveals the various possibilities to leverage them to spread malware and how legacy security technologies are ineffective against these attacks.

Poacher Turned Gamekeeper: Lessons Learned from Eight Years of Breaking Hypervisors

Hypervisors have become a key element of both cloud and client computing, and they play an important role in the security industry. Details of the lessons learned while building and breaking various common hypervisors are shared in this report. In addition, some vulnerabilities found in popular hypervisors that have led to break-outs are discussed and, when possible, generic mitigation measures that can be taken.

Endpoint Exploitation Trends 1H 2014

The only constant in cybersecurity is change. Security teams tasked with protecting critical enterprise assets need to track the shifting cyber-attack landscape to understand key trends in attack methods and targets. In this report, Bromium reveals the latest dynamics in the battle against attackers, enabling organizations to make the most effective use of security personnel and defend against attacks in a more effective way.