Process Doppelgänging Can’t be Detected, but Isolation Will Keep You Protected

2017-12-20T16:04:44+00:00December 20th, 2017|Threats|

Process Doppelgänging is a new code injection technique that bypasses most security tools and works on all Windows versions. Relying on detect-to-protect security solutions will leave you vulnerable to Process Doppelgänging. Bromium executes untrusted tasks in a hardware-isolated virtual machine, so you are always protected, even from zero-days and new, undetectable technique. What is Process [...]

The Emotet Banking Trojan: Analysis of Dropped Malware Morphing at Scale

2017-12-03T14:26:02+00:00December 3rd, 2017|Threats|

We analyzed samples containing the Emotet banking trojan and broke down the findings in a side-by-side comparison. Malware authors are repacking their malicious software into a unique executable for each potential victim, avoiding any-and-all signature-based detection. Repacked dropped executables on this scale are unprecedented, and this is why application isolation and control is so important. [...]

Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

2017-11-13T14:48:25+00:00November 13th, 2017|Breaking News, Threats|

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism. Bad guys are wrapping both the document and the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made to [...]

Watch: A Fresh Approach to Perimeter Protection: Application Isolation Webinar

2017-11-07T06:00:17+00:00November 7th, 2017|Company News|

Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers can work. Shift your mindset from “prevent, detect, and respond” to “isolate, contain, and control.” Layer after layer of security is not stopping breaches. We can’t keep the bad guys out. Oddly enough, 80+ years [...]

Securing the Modern Endpoint the SANS Maturity Way

2017-10-30T05:46:05+00:00October 30th, 2017|Threats|

In Case You Missed It Bromium recently engaged in a series of communications and events on the topic of Securing the Modern Endpoint, covering timely and provocative concepts including: How detection consistently fails to secure the enterprise and why new thinking is desperately needed How to realign your defenses around a modern threat risk model [...]

Protecting Legacy Applications from Attacks with Modern Hardware Isolation

2017-09-11T05:34:08+00:00September 11th, 2017|Company News|

Legacy applications are integral to most businesses and are heavily relied upon in the public sector Many legacy applications were written in a time when security was much less of a concern than today Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes Detection is obsolete and the future of [...]

Virtualization-Based Security is Helping Security Professionals Relax

2017-08-03T05:05:40+00:00August 3rd, 2017|Innovation|

Virtualization’s continued journey across the enterprise led inevitably to security Enhanced security benefits using virtualization are powerful and compelling Virtualization takes the security responsibility off users and delivers control to IT Detection-based security doesn’t work. It’s an exhausted concept. The battle’s been waged for 30 years and the cyber criminals won. Why? Because detection will [...]

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

2017-07-17T03:07:58+00:00July 17th, 2017|Innovation|

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intelligence eludes most organizations today, even among security [...]

See Our Threat Analysis of University College London Ransomware Attack

2017-06-16T11:19:28+00:00June 16th, 2017|Breaking News, Threats|

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close