Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File

New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent outbreak of sneaky malware, shared with us by some of our customers who caught The post Hackers Keep it Simple: Malware Evades Detection by Simply Copying a File appeared first on Bromium.
Read more

How to use Bromium Application Isolation to Secure Microsoft Edge Downloads

Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, The post How to use Bromium Application Isolation to Secure Microsoft Edge Downloads appeared first on Bromium.
Read more

We Have Answers: Questions from 2018 Cybersecurity Core Capabilities Webinar

Nicolas Chaillan, cybersecurity architect who worked for Homeland Security in the United States provided guidelines for your 2018 cybersercurity strategy. It is based on what he built for Cyber.gov – a strategy that takes the best of the best and delivers results based on the level of security you need. His recommendations work for both The post We Have Answers: Questions from 2018 Cybersecurity Core Capabilities Webinar appeared first on Bromium.
Read more

Survey: Few Americans Are Taking Proper Password Security Precautions

Thursday is “Change Your Password Day,” a national observance of password security and best practices. Passwords are often the first line of defense protecting users from criminals with the malicious intent of invading systems and stealing data, a threat which emphasizes the importance for people to use strong and diverse passwords. Unfortunately, many Americans continue … Read More The post Survey: Few Americans Are Taking Proper Password Security Precautions appeared first on The State of Security.
Read more

Seasons Greetings? Not When That’s Malware In Your e-Card

Over Christmas, one of our customers was hit by a Trojan and they asked us to take a look at the threat. Sixteen of their users were fooled into opening a Word document. Fortunately, they had Bromium, so it safely ran inside a micro-VM and was unable to affect their host or their intranet. Seasons The post Seasons Greetings? Not When That’s Malware In Your e-Card appeared first on Bromium.
Read more

Singapore government gets into the network defense game

Governments have been classically slow to adapt to digital realities. Singapore tries to break the mold with a new cybersecurity bill that tackles breaches, infrastructure, and reporting. Categories: Government Security world Tags: breachgovernmentlawprivacysingapore (Read more...) The post Singapore government gets into the network defense game appeared first on Malwarebytes Labs.
Read more

Survey: Half of RNs ‘Very Confident’ in Their Employers’ Ability to Secure Patient Data

The healthcare industry is no stranger to data breaches. In 2017, SSM Health, the University of Iowa Health Care (UIHC), and Arkansas Oral & Facial Surgery Center all suffered security incidents where bad actors possibly exposed patients’ medical data. No doubt there are also countless other healthcare organizations that have yet to detect an ongoing … Read More The post Survey: Half of RNs ‘Very Confident’ in Their Employers’ Ability to Secure Patient Data appeared first on The State of Security.
Read more

Aetna Accepts $17M Settlement Agreement for HIV Privacy Breach

Aetna has agreed to pay $17 million as part of a settlement agreement for a breach that might have compromised thousands of HIV patients’ privacy. On 16 January, the United States District Court for the Eastern District Court of Pennsylvania received a proposed settlement agreement (PDF). The arrangement stipulates that Aetna, Inc., Aetna Life Insurance … Read More The post Aetna Accepts $17M Settlement Agreement for HIV Privacy Breach appeared first on The State of Security.
Read more

Anatomy of Meltdown – A Technical Journey

This blog reviews the details of Meltdown and discusses the inherent immunity for end users provided by Bromium’s architecture. Meltdown is an Intel CPU vulnerability leveraging speculative execution which gives an attacker-controlled process the ability to read arbitrary memory belonging to the kernel. Although it doesn’t allow for an attacker to directly take control of the kernel, there The post Anatomy of Meltdown – A Technical Journey appeared first on Bromium.
Read more
Page 1 of 812345...Last »