Ian Pratt, Bromium Co-Founder, Speaks on Spectre and Meltdown [Video]

The Intel chip vulnerability triggered Spectre and Meltdown – information leakage vulnerabilities. Both let attackers that have execution in some unprivileged user space to read data belonging to other processes, even more privileged ones includi… Continue reading Ian Pratt, Bromium Co-Founder, Speaks on Spectre and Meltdown [Video]

Ian Pratt, Bromium Co-Founder, Discusses an Enterprise Response to Spectre and Meltdown [Video]

The Intel chip vulnerability triggered Spectre and Meltdown – information leakage vulnerabilities. Spectre and Meltdown require an attacker to run code on the target system. Micro-virtualization can really help mitigate the effects; even when dea… Continue reading Ian Pratt, Bromium Co-Founder, Discusses an Enterprise Response to Spectre and Meltdown [Video]

Bromium Response: Intel CPU Design Flaw Creates Work for Everyone

The design flaw has been in existence for the last decade and does not affect Bromium. Operating system vendors are the only ones who can remediate the vulnerability. The Microsoft patch – out today – requires Bromium customers to upgrade b… Continue reading Bromium Response: Intel CPU Design Flaw Creates Work for Everyone

Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism, both in the wrapping document and in the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made are more […]

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Bromium.

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Security Boulevard.

Continue reading Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism, both in the wrapping document and in the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made are more […]

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Bromium.

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Security Boulevard.

Continue reading Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection