You are here
Endpoint Protection and Endpoint Security Reports
In this report, Bromium examines cyber security trends from 2015, including vulnerabilities, exploits, malvertising, ransomware and macro malware. Key findings include the vulnerability of Flash, the ubiquity of malvertising, the resurgence of macro malware and the explosive growth of ransomware.
This report highlights security trends identified by more than 100 information security professionals who attended Black Hat 2015. Key findings include the endpoint as the source of greatest risk, critical infrastructure at risk of cyber attack and issues with Flash.
In this research report, Bromium analyzes the ongoing security risk of popular websites and software. The report highlights that more than 50 percent of malvertising is unknowingly hosted on news and entertainment websites, Flash exploits have increased 60 percent in the past six months, and the growth of ransomware families has doubled each year since 2013.
End users continue to be the greatest security risk, thanks to their tendency to click on malicious email and URLs, resulting in compromised endpoints, according to this Bromium survey. Security professionals agree that this poses challenges as they struggle to manage multiple point solutions, respond to the security alerts generated by users, and detect and remediate compromised endpoints.
Crypto-ransomware, including variants CryptoLocker and CryptoWall, shows no sign of abating since traditional detection-based security, such as antivirus, is ineffective at stopping this threat. Crypto-ransomware encrypts files, locking them from user access, until a ransom is paid. In this report, Bromium dissects nearly 30 samples of ransomware, revealing the increasing sophisticated tactics being used.
From an attacker’s perspective, ad networks are no different and may even be better than exploit kits. They are viable candidates as the next primary attack vector. An in-depth analysis of malicious Web ads reveals the various possibilities to leverage them to spread malware and how legacy security technologies are ineffective against these attacks.
Hypervisors have become a key element of both cloud and client computing, and they play an important role in the security industry. Details of the lessons learned while building and breaking various common hypervisors are shared in this report. In addition, some vulnerabilities found in popular hypervisors that have led to break-outs are discussed and, when possible, generic mitigation measures that can be taken.
The only constant in cybersecurity is change. Security teams tasked with protecting critical enterprise assets need to track the shifting cyber-attack landscape to understand key trends in attack methods and targets. In this report, Bromium reveals the latest dynamics in the battle against attackers, enabling organizations to make the most effective use of security personnel and defend against attacks in a more effective way.