Magellan and the Security Pitfalls of Third-Party Code

2019-06-10T18:57:49-07:00December 22nd, 2018|Threats|

The Security Pitfalls of Third-Party Code As the web evolves, webpages are offering new powerful and interactive features Vulnerabilities in these features may allow remote attackers to run malware on your machine Bromium uses hardware-enforced isolation to protect against these attacks by design The recent Magellan vulnerability in SQLite allows attackers to exploit affected applications [...]

Dissecting the POP SS Vulnerability

2019-06-11T09:44:15-07:00May 17th, 2018|Threats|

The newly uncovered POP SS vulnerability takes advantage of a widespread misconception about behaviour of pop ss or mov ss  instructions resulting in exceptions when the instruction immediately following is an interrupt. It is a privilege escalation, and as a result it assumes that the attacker has some level of control over a userland process [...]

Anatomy of Meltdown – A Technical Journey

2019-06-11T09:45:39-07:00January 15th, 2018|Breaking News, Threats|

This blog reviews the details of Meltdown and discusses the inherent immunity for end users provided by Bromium's architecture. Meltdown is an Intel CPU vulnerability leveraging speculative execution which gives an attacker-controlled process the ability to read arbitrary memory belonging to the kernel. Although it doesn't allow for an attacker to directly take control of the kernel, there [...]

Bromium Response: Intel CPU Design Flaw Creates Work for Everyone

2019-06-11T09:45:52-07:00January 4th, 2018|Breaking News, Threats|

The design flaw has been in existence for the last decade. Operating system vendors are the only ones who can remediate the vulnerability. The Microsoft patch – out today - requires Bromium customers to upgrade before patching Windows. Spectre or Meltdown cannot be directly used to steal information from an unpatched machine with Bromium because [...]

Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer

2017-04-17T08:03:13-07:00April 17th, 2017|Breaking News, Government, Threats|

The Bromium Labs team was able to get their hands on some live malware exploiting the Microsoft office vulnerability. First and foremost, on an unpatched workstation Bromium did its job by hardware isolating the Microsoft Word document into a protected virtual machine so that the host workstation was never infected. Secondly, it shows the amazing analytics [...]

See Bromium in Action

Request a demo and see how Bromium isolation will put an end to malware and attacks once and for all.

Request a Demo

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.