Anatomy of Meltdown – A Technical Journey

2018-01-15T17:56:09+00:00January 15th, 2018|Breaking News, Threats|

This blog reviews the details of Meltdown and discusses the inherent immunity for end users provided by Bromium's architecture. Meltdown is an Intel CPU vulnerability leveraging speculative execution which gives an attacker-controlled process the ability to read arbitrary memory belonging to the kernel. Although it doesn't allow for an attacker to directly take control of the kernel, there [...]

Ian Pratt, Bromium Co-Founder, Speaks on Spectre and Meltdown [Video, Part 1]

2018-01-08T19:04:43+00:00January 8th, 2018|Breaking News|

The Intel chip vulnerability triggered Spectre and Meltdown - information leakage vulnerabilities. Both let attackers that have execution in some unprivileged user space to read data belonging to other processes, even more privileged ones including the kernel itself. Meltdown only effects Intel CPUs, whereas the Spectre vulnerability is present on pretty much all modern CPUs [...]

Ian Pratt, Bromium Co-Founder, Discusses an Enterprise Response to Spectre and Meltdown [Video, Part 2]

2018-01-08T19:02:10+00:00January 8th, 2018|Breaking News|

The Intel chip vulnerability triggered Spectre and Meltdown - information leakage vulnerabilities. Spectre and Meltdown require an attacker to run code on the target system. Micro-virtualization can really help mitigate the effects; even when dealing with kernel vulnerabilities. We asked our founder, Ian Pratt, to talk to us about Spectre, Meltdown and what this means [...]

Ian Pratt, Bromium Co-Founder, Why Bromium is Releasing an Upgrade [Video, Part 3]

2018-01-08T12:07:14+00:00January 8th, 2018|Breaking News|

The Intel chip vulnerability triggered Spectre and Meltdown - information leakage vulnerabilities. With the advent of the Microsoft Windows patch, it’s important to upgrade Bromium first to keep your security intact. Micro-virtualization can really help mitigate the effects; even when dealing with kernel vulnerabilities. We asked our founder, Ian Pratt, to talk to us about [...]

Bromium Response: Intel CPU Design Flaw Creates Work for Everyone

2018-01-04T06:35:46+00:00January 4th, 2018|Breaking News, Threats|

The design flaw has been in existence for the last decade. Operating system vendors are the only ones who can remediate the vulnerability. The Microsoft patch – out today - requires Bromium customers to upgrade before patching Windows. Spectre or Meltdown cannot be directly used to steal information from an unpatched machine with Bromium because [...]

Malicious Phishing Protection Achieved with Bromium’s Application Isolation [video]

2018-01-03T05:49:48+00:00January 3rd, 2018|Threats|

Use Bromium to stop malicious phishing and safely open any shared web link from email or chat clients Eliminate restrictive IT security policies that limit user access to shared URLs Protect remote and roaming endpoints from malicious links when outside of layered defenses The news isn’t good. Malicious phishing links in email and chat clients [...]

Process Doppelgänging Can’t be Detected, but Isolation Will Keep You Protected

2017-12-20T16:04:44+00:00December 20th, 2017|Threats|

Process Doppelgänging is a new code injection technique that bypasses most security tools and works on all Windows versions. Relying on detect-to-protect security solutions will leave you vulnerable to Process Doppelgänging. Bromium executes untrusted tasks in a hardware-isolated virtual machine, so you are always protected, even from zero-days and new, undetectable technique. What is Process [...]

The Emotet Banking Trojan: Analysis of Dropped Malware Morphing at Scale

2017-12-03T14:26:02+00:00December 3rd, 2017|Threats|

We analyzed samples containing the Emotet banking trojan and broke down the findings in a side-by-side comparison. Malware authors are repacking their malicious software into a unique executable for each potential victim, avoiding any-and-all signature-based detection. Repacked dropped executables on this scale are unprecedented, and this is why application isolation and control is so important. [...]

Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

2017-11-13T14:48:25+00:00November 13th, 2017|Breaking News, Threats|

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism. Bad guys are wrapping both the document and the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made to [...]

Breachless Threat Intelligence: A Pain-Free Approach to CyberSecurity

2017-07-17T03:07:58+00:00July 17th, 2017|Innovation|

Enterprises need a steady stream of actionable, timely, and accurate threat intelligence on targeted malicious intrusions and attempts into their networks They need this information without suffering breaches and cannot rely solely on post-compromise forensics or sandbox simulations to continuously tighten and adapt their defenses Pre-breach targeted intelligence eludes most organizations today, even among security [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close