How Hackers Exploit Online Games

2018-10-29T16:46:16+00:00October 31st, 2018|Threats|

Legitimate platforms like online gaming services are a breeding ground for hackers, with in-game currencies and micro-transactions putting a target on the gaming industry’s back Online games have also provided a testing ground for hackers keen to test their malware on unsuspecting players Hackers taking advantage of social networks like LinkedIn is nothing new in [...]

How Bromium Application Isolation Secures Bank Wire Transfers

2018-02-14T10:03:50+00:00February 14th, 2018|End Users|

Banks and financial institutions use Bromium to secure wire transfers. Bromium application isolation secures the print driver, so the wire transfer request cannot be hacked. We live in a global world and that means global commerce. So how does legal tender change hands? Well, if you’re not sending money to a Nigerian prince, then you’re [...]

Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File

2018-02-13T10:45:09+00:00February 13th, 2018|Threats|

New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent outbreak of sneaky malware, shared with us by some of our customers who caught [...]

Research Uncovers the Hidden Costs of Detection-based Cybersecurity [Infographic]

2018-02-06T04:01:03+00:00February 6th, 2018|Company News|

Our new research conducted by Vanson Bourne finds detect-to-protect security costs organizations more than $16 million per year. This is despite the fact that detection-based cybersecurity is failing to keep up with increasingly sophisticated malware. The infographic below explains the only effective way to reduce threats is to render them harmless with virtualization-based application isolation. [...]

Cybersecurity vs Productivity: The CISO’s Dilemma

2017-10-23T06:09:38+00:00October 23rd, 2017|Company News|

Today organizations are struggling with the best way to protect against attacks that are targeting the endpoint. Too often, the security strategy has been to put the onus on the individual employee. Research has shown, over and over again, that training and user restrictions are both tedious and expensive, and have a very low success [...]

The New Battlefield: Why Nation-State Malware is Winning

2017-04-25T04:05:40+00:00April 25th, 2017|Government, Threats|

This warfare is being fought with computers and special created malware. It is Cyber Warfare and every large nation is playing along The most recent exposed vulnerability from Microsoft demonstrates exactly the type of method Nation-State attackers’ use. So how does a nation as sophisticated as the United States keep losing the cyber battle? The problem lies [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close