Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File

New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent outbreak of sneaky malware, shared with us by some of our customers who caught The post Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File appeared first on Bromium.
Read more

Seasons Greetings? Not When That’s Malware In Your e-Card

Over Christmas, one of our customers was hit by a Trojan and they asked us to take a look at the threat. Sixteen of their users were fooled into opening a Word document. Fortunately, they had Bromium, so it safely ran inside a micro-VM and was unable to affect their host or their intranet. Seasons The post Seasons Greetings? Not When That’s Malware In Your e-Card appeared first on Bromium.
Read more

Process Doppelgänging Can’t be Detected, but Isolation Will Keep You Protected

Process Doppelgänging is a new code injection technique that bypasses most security tools and works on all Windows versions. Relying on detect-to-protect security solutions will leave you vulnerable to Process Doppelgänging. Bromium executes untrusted tasks in a hardware-isolated virtual machine, so you are always protected, even from zero-days and new, undetectable technique. What is Process The post Process Doppelgänging Can’t be Detected, but Isolation Will Keep You Protected appeared first on Bromium.
Read more