Five Reasons Why Marketing Needs to Care About Cybersecurity

2018-02-20T06:04:50+00:00February 20th, 2018|End Users|

Marketing moves fast and worrying about cybersecurity is often the least of our worries. Cybercriminals understand we're working fast and target our computers because we are likely to do what comes naturally: click, download, forward, open. Alas, organizational security teams struggle to keep us safe and often put limits on our ability to get stuff [...]

Seasons Greetings? Not When That’s Malware In Your e-Card

2018-01-29T05:45:39+00:00January 29th, 2018|Threats|

Over Christmas, one of our customers was hit by a Trojan and they asked us to take a look at the threat. Sixteen of their users were fooled into opening a Word document. Fortunately, they had Bromium, so it safely ran inside a micro-VM and was unable to affect their host or their intranet. Seasons [...]

Malicious Phishing Protection Achieved with Bromium’s Application Isolation [video]

2018-01-03T05:49:48+00:00January 3rd, 2018|Threats|

Use Bromium to stop malicious phishing and safely open any shared web link from email or chat clients Eliminate restrictive IT security policies that limit user access to shared URLs Protect remote and roaming endpoints from malicious links when outside of layered defenses The news isn’t good. Malicious phishing links in email and chat clients [...]

Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

2017-11-13T14:48:25+00:00November 13th, 2017|Breaking News, Threats|

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism. Bad guys are wrapping both the document and the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made to [...]

When All Else Fails in Cybersecurity, Application Isolation Does Not

2017-07-26T08:42:11+00:00July 26th, 2017|Government, Threats|

We hear about cybersecurity fails all the time. We're happy to tell you it doesn't have to be that way. Application isolation and containment based on virtualization is delivering results. In the US, the NSA has called out this strategy as the way forward for stopping advanced threats. This post has been updated to reflect [...]

See Our Threat Analysis of University College London Ransomware Attack

2017-06-16T11:19:28+00:00June 16th, 2017|Breaking News, Threats|

Ransomware has hit the news again in the UK today only a few short weeks since the WannaCry outbreak crippled the National Health Service. This time University College London (UCL) was hit by a ransomware strain which has resulted in them having to take down parts of their network to stop infected machines harming key university [...]

Fresh Phish. (So Many Puns, So Little Time.)

2017-05-23T05:04:50+00:00May 23rd, 2017|Threats|

Today's phish blog breaks our format a bit so we can bring you lots of examples. Enjoy. And then get protected! Phishing is prevalent because it works. Even savvy users can be tricked into opening the wrong emails. I’ve seen a couple of clear examples of this recently. The first is one that quite convincingly [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close