When All Else Fails in Cybersecurity, Application Isolation Does Not

We hear about cybersecurity fails all the time. We’re happy to tell you it doesn’t have to be that way. Application isolation and containment based on virtualization is delivering results. The NSA has called out this strategy as the way forward for stopping advanced threats. To many technology folks, Application Isolation may be a new […]

The post When All Else Fails in Cybersecurity, Application Isolation Does Not appeared first on Bromium.

Continue reading When All Else Fails in Cybersecurity, Application Isolation Does Not

The New Battlefield: Why Nation-State Malware is Winning

This warfare is being fought with computers and special created malware. It is Cyber Warfare and every large nation is playing along The most recent exposed vulnerability from Microsoft demonstrates exactly the type of method Nation-State attackers’ use. So how does a nation as sophisticated as the United States keep losing the cyber battle? The problem lies […]

The post The New Battlefield: Why Nation-State Malware is Winning appeared first on Bromium.

Continue reading The New Battlefield: Why Nation-State Malware is Winning

Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer

The Bromium Labs team was able to get their hands on some live malware exploiting the Microsoft office vulnerability. First and foremost, on an unpatched workstation Bromium did its job by hardware isolating the Microsoft Word document into a protected virtual machine so that the host workstation was never infected. Secondly, it shows the amazing analytics […]

The post Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer appeared first on Bromium.

Continue reading Microsoft Office Malware Captured in a Micro-VM on an Unpatched Computer

Malware is Becoming Alarming. Can You Hear Me Now?

A supposed “white hat” hacker gained access to the network of the Dallas Office of Emergency Management and managed to set off 156 sirens used to alert of an emergency Alarms blared for 90 minutes before the city was able to manually shut down the entire system. How does this continue to happen? Because the current method […]

The post Malware is Becoming Alarming. Can You Hear Me Now? appeared first on Bromium.

Continue reading Malware is Becoming Alarming. Can You Hear Me Now?

Zero-Day Vulnerability is a Zero-Sum Game

Late last week a new Microsoft Office vulnerability was discovered by McAfee; they discovered attacks exploiting this vulnerability back to late January 2017. This should raise substantial concern for anyone responsible for cyber security at their company or federal agency. Since January, every Windows-based MS Office machine was exposed to the worst type of malware: zero-day. Late last […]

The post Zero-Day Vulnerability is a Zero-Sum Game appeared first on Bromium.

Continue reading Zero-Day Vulnerability is a Zero-Sum Game

Attention Federal Agencies: You Aren’t Stopping All Malware

On March 4th 2016 an endpoint at a U.S. Federal Agency encountered the Angler EK TeslaCrypt while browsing a web site (hxxp://pssor.com/pssor-home) with Internet Explorer. At the time the malware was executed on the endpoint (March 4th 2016), this was not known by any anti-virus vendor. In fact, the earliest this was discovered was March […]

The post Attention Federal Agencies: You Aren’t Stopping All Malware appeared first on Bromium.

Continue reading Attention Federal Agencies: You Aren’t Stopping All Malware

The OPM Breach and Why You Should Fire Your Cyber Janitor

In June of 2015 the United States Office of Personnel Management (OPM) announced they had been the target of what became one of the largest breaches of government data in history. When the dust settled, it was determined that over 20 million people were affected. The data stolen from individuals was Social Security numbers, names, […] Continue reading The OPM Breach and Why You Should Fire Your Cyber Janitor