Email Attachments (Even the Bad Ones) Can’t Bypass Application Isolation [video]

2018-01-02T06:05:31+00:00January 2nd, 2018|Threats|

Safely open any email attachment from Outlook or web mail, even if it contains malware Eliminate restrictive IT security policies that limit access to email attachments Improve user productivity by removing the risk of opening malicious email attachments Email attachments drive cybersecurity experts nuts. Despite advancements in malware detection, malicious email attachments are still getting [...]

Process Doppelgänging Can’t be Detected, but Isolation Will Keep You Protected

2017-12-20T16:04:44+00:00December 20th, 2017|Threats|

Process Doppelgänging is a new code injection technique that bypasses most security tools and works on all Windows versions. Relying on detect-to-protect security solutions will leave you vulnerable to Process Doppelgänging. Bromium executes untrusted tasks in a hardware-isolated virtual machine, so you are always protected, even from zero-days and new, undetectable technique. What is Process [...]

Get the Report: CISO Recommendations for Endpoint Security by Security Current

2017-12-19T07:45:33+00:00December 19th, 2017|Company News|

New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value of application isolation provided via virtualization-based security when compared to traditional endpoint security approaches Download the report: CISOs Investigate: Endpoint Security Cloud. Mobile. [...]

The Emotet Banking Trojan: Analysis of Dropped Malware Morphing at Scale

2017-12-03T14:26:02+00:00December 3rd, 2017|Threats|

We analyzed samples containing the Emotet banking trojan and broke down the findings in a side-by-side comparison. Malware authors are repacking their malicious software into a unique executable for each potential victim, avoiding any-and-all signature-based detection. Repacked dropped executables on this scale are unprecedented, and this is why application isolation and control is so important. [...]

Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

2017-11-13T14:48:25+00:00November 13th, 2017|Breaking News, Threats|

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism. Bad guys are wrapping both the document and the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made to [...]

The Godfathers of Virtualization Returning to VMWorld

2017-08-15T10:28:32+00:00August 15th, 2017|Company News|

Ian Pratt and Simon Crosby sold XenSource to Citrix in 2007. After working at Citrix, they decided to once again spin off and focus on cybersecurity. They are available to meet during VMWorld if you’d like to talk virtualization and security. We think of them as The Godfathers of Virtualization. The work they did with [...]

When All Else Fails in Cybersecurity, Application Isolation Does Not

2017-07-26T08:42:11+00:00July 26th, 2017|Government, Threats|

We hear about cybersecurity fails all the time. We're happy to tell you it doesn't have to be that way. Application isolation and containment based on virtualization is delivering results. In the US, the NSA has called out this strategy as the way forward for stopping advanced threats. This post has been updated to reflect [...]

Zero-Day Exploits – Your Days are Numbered! [infographic]

2017-04-21T16:27:39+00:00April 21st, 2017|Threats|

News stories involving zero-day Windows kernel exploits seemingly never end. Fresh examples abound with alarming regularity and devastating effects, often involving defects with a dwell time of many months before they are formally addressed by patch updates. Despite a sustained focus by Microsoft on improving cybersecurity top to bottom, dubious new records were set in [...]

Zero-Day Vulnerability is a Zero-Sum Game

2017-04-10T14:22:11+00:00April 10th, 2017|Breaking News, Government, Threats|

Late last week a new Microsoft Office vulnerability was discovered by McAfee; they discovered attacks exploiting this vulnerability back to late January 2017. This should raise substantial concern for anyone responsible for cyber security at their company or federal agency. Since January, every Windows-based MS Office machine was exposed to the worst type of malware: zero-day. UPDATE! We [...]

Breaking News: “It’s a Very Large-Scale Espionage Operation”

2017-04-04T11:29:16+00:00April 4th, 2017|Breaking News, Threats|

A complex cybercrime spy ring has been revealed today. A China-based cyber gang is behind the effort. Countries targeted include Japan, UK, France and the United States. If you're responsible for your company's cyber security, chances are, someone in your office has probably already forwarded this story to you. The Telegraph is sharing a story [...]

See Bromium in Action

Put an end to malware and attacks once and for all. Request a demo of the Bromium Secure Platform to learn how Bromium uses virtualization-based security to isolate applications and stop threats. Complete the form to request a demo.

Thank you! The information has been submitted successfully.

By continuing to use the site, you agree to the use of cookies. More information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close