Anatomy of Meltdown – A Technical Journey

This blog reviews the details of Meltdown and discusses the inherent immunity for end users provided by Bromium’s architecture. Meltdown is an Intel CPU vulnerability leveraging speculative execution which gives an attacker-controlled process the ability to read arbitrary memory belonging to the kernel. Although it doesn’t allow for an attacker to directly take control of the kernel, there The post Anatomy of Meltdown – A Technical Journey appeared first on Bromium.
Read more

The Emotet Banking Trojan: Analysis of Dropped Malware Morphing at Scale

We analyzed samples containing the Emotet banking trojan and broke down the findings in a side-by-side comparison. Malware authors are repacking their malicious software into a unique executable for each potential victim, avoiding any-and-all signature-based detection. Repacked dropped executables on this scale are unprecedented, and this is why application isolation and control is so important. The post The Emotet Banking Trojan: Analysis of Dropped Malware Morphing at Scale appeared first on Bromium.
Read more