Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File

2018-02-13T10:45:09+00:00February 13th, 2018|Threats|

New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent outbreak of sneaky malware, shared with us by some of our customers who caught [...]

Seasons Greetings? Not When That’s Malware In Your e-Card

2018-01-29T05:45:39+00:00January 29th, 2018|Threats|

Over Christmas, one of our customers was hit by a Trojan and they asked us to take a look at the threat. Sixteen of their users were fooled into opening a Word document. Fortunately, they had Bromium, so it safely ran inside a micro-VM and was unable to affect their host or their intranet. Seasons [...]

Malicious Phishing Protection Achieved with Bromium’s Application Isolation [video]

2018-01-03T05:49:48+00:00January 3rd, 2018|Threats|

Use Bromium to stop malicious phishing and safely open any shared web link from email or chat clients Eliminate restrictive IT security policies that limit user access to shared URLs Protect remote and roaming endpoints from malicious links when outside of layered defenses The news isn’t good. Malicious phishing links in email and chat clients [...]

A Cybersecurity Proof: The Application is the Endpoint

2017-10-16T09:25:16+00:00October 16th, 2017|Threats|

Vulnerable applications and browsers are the persistent data breach entry points—it’s not about the files Isolation is the only solution that can absolutely eliminate kernel-level exploits and malware escapes It’s time to rethink information security defense around fewer, smarter, yet more effective layers You have many more endpoints than you think. How many endpoints do [...]

Signatures Not the Root of Prevention

2017-05-11T05:26:22+00:00May 11th, 2017|Breaking News|

Faulty file definitions strike once again! On April 24, anti-virus provider Webroot issued an automated update to its signature definitions. This inadvertently quarantined hundreds of critical customer files and applications that it erroneously flagged as malicious. At one time or another, it seems that every anti-malware endpoint security provider has fallen victim to the same [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close