threat report

Why Customers Trust Bromium to Let Malware Run on their Endpoints

Bromium customers enthusiastically choose to let malware keep running in isolated micro-VMs 86% of the time This seemingly counterintuitive approach…

2 years ago

Deeper Down the Rabbit Hole: Second-Stage Attack and a Fileless Finale

­­In our last blog, “Following a Trail of Confusion: PowerShell in Malicious Office Documents”, we systematically unraveled multiple layers of…

2 years ago

CVE-2018-17914

InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017…

2 years ago

Five Eyes Cybersecurity Agencies Release Report on Hacking Tools

The national cybersecurity agencies of the United States, U.K., Canada, Australia and New Zealand, known in the intelligence world as…

2 years ago

Following a Trail of Confusion: PowerShell in Malicious Office Documents

While the threat landscape continues to evolve, Microsoft Office documents continue to see steady usage by malicious actors. These documents,…

2 years ago

Data Talks: Download Attacks Ignite While Attachments Cool Their Heels

Bromium customers see a significant increase in attacks via downloads as compared to email attachments "Compound attacks" are increasingly common,…

2 years ago

Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point

Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat…

2 years ago

Q2 Appthority Pulse Report Finds Chat Apps Most Popular, Risky & Blacklisted Apps

Today Appthority released our Q2 Enterprise Mobile Security Pulse Report. The report looks at three areas of interest to enterprise mobility and security teams: 1) the…

2 years ago

UK at growing risk of major cyber incidents, terrorist attacks, research suggests

New data from a report on the UK threat landscape indicates the country’s emergency services are at risk of a…

3 years ago