Application Isolation in the Spotlight

2019-03-21T15:32:21+00:00March 21st, 2019|End Users, Threats|

Two major announcements bring application isolation into the spotlight Microsoft and HP elevate the importance of isolation in the endpoint security stack Isolate risky browser activity, but don’t forget files are risky too This week, two major announcements came out highlighting the need for application isolation in the security stack for endpoint security – HP [...]

Location-Aware Malware Targets Japanese and Korean Endpoints

2019-04-04T06:11:20+00:00March 14th, 2019|Threats|

New malware samples use location awareness to specifically target Japanese and Korean endpoints. The malware uses two techniques to determine the location in which it is being executed and ensures that the payload will only be triggered in these regions. This approach matches two trends: 1) docs performing regional checks in targeted attacks, and 2) [...]

Preview Pain: Malware Triggers in Outlook Preview Without User Opening Word Document

2019-02-13T20:43:41+00:00February 13th, 2019|Threats|

A recent malware sample forwarded to our Threat Intelligence service had some very interesting properties which we think would be useful to share. The sample itself is a Word document which is emailed as part of a phishing attack. If the user interacts with the document, it would download a payload to run on the [...]

How to Use Bromium Application Isolation to Secure Microsoft Edge Downloads

2018-02-05T07:40:16+00:00February 5th, 2018|Innovation|

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, [...]

Ian Pratt, Bromium Co-Founder, Speaks on Spectre and Meltdown [Video, Part 1]

2018-01-08T19:04:43+00:00January 8th, 2018|Breaking News|

The Intel chip vulnerability triggered Spectre and Meltdown - information leakage vulnerabilities. Both let attackers that have execution in some unprivileged user space to read data belonging to other processes, even more privileged ones including the kernel itself. Meltdown only effects Intel CPUs, whereas the Spectre vulnerability is present on pretty much all modern CPUs [...]

Ian Pratt, Bromium Co-Founder, Discusses an Enterprise Response to Spectre and Meltdown [Video, Part 2]

2018-01-08T19:02:10+00:00January 8th, 2018|Breaking News|

The Intel chip vulnerability triggered Spectre and Meltdown - information leakage vulnerabilities. Spectre and Meltdown require an attacker to run code on the target system. Micro-virtualization can really help mitigate the effects; even when dealing with kernel vulnerabilities. We asked our founder, Ian Pratt, to talk to us about Spectre, Meltdown and what this means [...]

Ian Pratt, Bromium Co-Founder, Why Bromium is Releasing an Upgrade [Video, Part 3]

2018-01-08T12:07:14+00:00January 8th, 2018|Breaking News|

The Intel chip vulnerability triggered Spectre and Meltdown - information leakage vulnerabilities. With the advent of the Microsoft Windows patch, it’s important to upgrade Bromium first to keep your security intact. Micro-virtualization can really help mitigate the effects; even when dealing with kernel vulnerabilities. We asked our founder, Ian Pratt, to talk to us about [...]

Bromium Response: Intel CPU Design Flaw Creates Work for Everyone

2018-01-04T06:35:46+00:00January 4th, 2018|Breaking News, Threats|

The design flaw has been in existence for the last decade. Operating system vendors are the only ones who can remediate the vulnerability. The Microsoft patch – out today - requires Bromium customers to upgrade before patching Windows. Spectre or Meltdown cannot be directly used to steal information from an unpatched machine with Bromium because [...]

Browser Isolation with Microsoft Windows Defender Application Guard (WDAG): What It Does, How It Works and What It Means

2017-12-11T06:00:56+00:00December 11th, 2017|Innovation|

Microsoft brings hardware isolation to the web browser Bromium and Microsoft have similar approaches to browser isolation using virtualization Microsoft protects only their own OS and proprietary Microsoft applications Bromium works with all Microsoft VBS technologies, and together we secure far more of the Windows attack surface than Microsoft does on its own Creating momentum [...]

Cybersecurity Virtualization Expert Ian Pratt Explains WannaCry Exploit

2017-05-14T15:52:21+00:00May 14th, 2017|Breaking News|

Ian Pratt, co-founder of Bromium and a virtualization expert was interviewed by Sky News. The video clip below shows how the malware arrived and how it deployed. This is the first of what will be many likely exploits in the months to come. WannaCry is likely the first of many global cybersecurity events that will [...]

See Bromium in Action

Request a demo and see how Bromium isolation will put an end to malware and attacks once and for all.

Request a Demo

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close