Introducing the Bromium Threat Insights Report

This report is made possible by customers who opted to share their Bromium-isolated threat data with Bromium, which our experts compiled into a Threat Insights Report Bromium Threat Insights Report is designed to share intelligence about the most notab… Continue reading Introducing the Bromium Threat Insights Report

Why Customers Trust Bromium to Let Malware Run on their Endpoints

Bromium customers enthusiastically choose to let malware keep running in isolated micro-VMs 86% of the time This seemingly counterintuitive approach maximizes threat intelligence, made possible only by virtualization-based security Traditional solution… Continue reading Why Customers Trust Bromium to Let Malware Run on their Endpoints

Bromium Secure Platform 4.1.4 Adds Threat Intelligence, Firefox Browsing, and More

Leverage Bromium Threat Cloud intelligence for real-time malware family and severity classifications Enjoy safe native browsing using Mozilla Firefox with risky sites isolated in Bromium Secure Browser Securely isolate the latest versions of Microsoft … Continue reading Bromium Secure Platform 4.1.4 Adds Threat Intelligence, Firefox Browsing, and More

Following a Trail of Confusion: PowerShell in Malicious Office Documents

While the threat landscape continues to evolve, Microsoft Office documents continue to see steady usage by malicious actors. These documents, often times equipped with nothing more than the built-in capability offered by the macros, are continuously le… Continue reading Following a Trail of Confusion: PowerShell in Malicious Office Documents

Following a Trail of Confusion: PowerShell in Malicious Office Documents

While the threat landscape continues to evolve, Microsoft Office documents continue to see steady usage by malicious actors. These documents, often times equipped with nothing more than the built-in capability offered by the macros, are continuously le… Continue reading Following a Trail of Confusion: PowerShell in Malicious Office Documents

Data Talks: Download Attacks Ignite While Attachments Cool Their Heels

Bromium customers see a significant increase in attacks via downloads as compared to email attachments “Compound attacks” are increasingly common, with cybercriminals employing multiple attack vectors in tandem No matter how the threats arrive, it&#821… Continue reading Data Talks: Download Attacks Ignite While Attachments Cool Their Heels

Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point

Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat research using aggregated data voluntarily reported by Bromium customers Look for deep-dives, trends, and pred… Continue reading Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point