Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism, both in the wrapping document and in the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made are more […]

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Bromium.

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Security Boulevard.

Continue reading Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

Phishing attacks are nothing new, but we are noticing a new trend for polymorphism, both in the wrapping document and in the dropped executable. In samples that are literally minutes old, we see the control server is re-obfuscating and updating the malware faster than anti-virus programs are updating their awareness. The changes made are more […]

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Bromium.

The post Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection appeared first on Security Boulevard.

Continue reading Phishing Trojan Campaign Picks Up Pace, Morphing at Scale to Defeat Legacy Detection

A Fresh Approach to Perimeter Protection: Application Isolation

Detection-based IT security solutions have never worked, and will never work. More security layers is not the answer, but smarter layers can work. Shift your mindset from “prevent, detect, and respond” to “isolate, contain, and control.” Layer after layer of security is not stopping breaches. We can’t keep the bad guys out. Oddly enough, 80+ years […]

The post A Fresh Approach to Perimeter Protection: Application Isolation appeared first on Bromium.

The post A Fresh Approach to Perimeter Protection: Application Isolation appeared first on Security Boulevard.

Continue reading A Fresh Approach to Perimeter Protection: Application Isolation