Why Customers Trust Bromium to Let Malware Run on their Endpoints

Bromium customers enthusiastically choose to let malware keep running in isolated micro-VMs 86% of the time This seemingly counterintuitive approach maximizes threat intelligence, made possible only by virtualization-based security Traditional solutions try ...
Deeper Down the Rabbit Hole: Second-Stage Attack and a Fileless Finale

Deeper Down the Rabbit Hole: Second-Stage Attack and a Fileless Finale

­­In our last blog, “Following a Trail of Confusion: PowerShell in Malicious Office Documents”, we systematically unraveled multiple layers of obfuscation initiated by a weaponized first-stage Microsoft Word document to reveal a ...

CVE-2018-17914

InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017 SP2. [...] ...
Language Matters Data Breach

Five Eyes Cybersecurity Agencies Release Report on Hacking Tools

The national cybersecurity agencies of the United States, U.K., Canada, Australia and New Zealand, known in the intelligence world as the Five Eyes, have released a joint report on five publicly available ...
Security Boulevard
Following a Trail of Confusion: PowerShell in Malicious Office Documents

Following a Trail of Confusion: PowerShell in Malicious Office Documents

While the threat landscape continues to evolve, Microsoft Office documents continue to see steady usage by malicious actors. These documents, often times equipped with nothing more than the built-in capability offered by ...
Bromium-Attachments-vs-Downloads-Overall

Data Talks: Download Attacks Ignite While Attachments Cool Their Heels

Bromium customers see a significant increase in attacks via downloads as compared to email attachments "Compound attacks" are increasingly common, with cybercriminals employing multiple attack vectors in tandem No matter how the ...
Bromium-Data-Talks-Web-vs-File-Based-Attacks-Over-Time

Data Talks: The Big Shift to File-Based Attacks Scrambles the Security Industry

Bromium sees a dramatic drop in the percentage of browser-based attacks in 2018 compared to file-based attacks Microsoft’s legacy Internet Explorer is now the only major web browser with serious remaining security ...
Bromium-Application-Isolation-and-Control-Last-Line-of-Defense

Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point

Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat research using aggregated data voluntarily reported by Bromium customers Look for deep-dives, ...
UK at growing risk of major cyber incidents, terrorist attacks, research suggests

UK at growing risk of major cyber incidents, terrorist attacks, research suggests

New data from a report on the UK threat landscape indicates the country’s emergency services are at risk of a major cyber-attack, which could open the door to terrorist attacks as well ...