Sophos 2020 Threat Report: AI is the new battleground
The SophosLabs 2020 Threat Report highlights a growing battle as smart automation technologies continue to evolve. Continue reading Sophos 2020 Threat Report: AI is the new battleground
Collaborate Disseminate
The SophosLabs 2020 Threat Report highlights a growing battle as smart automation technologies continue to evolve. Continue reading Sophos 2020 Threat Report: AI is the new battleground
Bromium customers enthusiastically choose to let malware keep running in isolated micro-VMs 86% of the time This seemingly counterintuitive approach maximizes threat intelligence, made possible only by virtualization-based security Traditional solution… Continue reading Why Customers Trust Bromium to Let Malware Run on their Endpoints
This week: hacking phones at Pwn2Own, the brand new SophosLabs Threat report, and squeezing Shakespeare into one tweet. Enjoy! Continue reading Could have sworn I deleted that photo from my phone! [PODCAST]
InduSoft Web Studio versions prior to 8.1 SP2, and InTouch Edge HMI (formerly InTouch Machine Edition) versions prior to 2017 SP2. […] Continue reading CVE-2018-17914
The national cybersecurity agencies of the United States, U.K., Canada, Australia and New Zealand, known in the intelligence world as the Five Eyes, have released a joint report on five publicly available hacking tools that are widely used in cyberatt… Continue reading Five Eyes Cybersecurity Agencies Release Report on Hacking Tools
While the threat landscape continues to evolve, Microsoft Office documents continue to see steady usage by malicious actors. These documents, often times equipped with nothing more than the built-in capability offered by the macros, are continuously le… Continue reading Following a Trail of Confusion: PowerShell in Malicious Office Documents
While the threat landscape continues to evolve, Microsoft Office documents continue to see steady usage by malicious actors. These documents, often times equipped with nothing more than the built-in capability offered by the macros, are continuously le… Continue reading Following a Trail of Confusion: PowerShell in Malicious Office Documents
Bromium customers see a significant increase in attacks via downloads as compared to email attachments “Compound attacks” are increasingly common, with cybercriminals employing multiple attack vectors in tandem No matter how the threats arrive, it̵… Continue reading Data Talks: Download Attacks Ignite While Attachments Cool Their Heels
Bromium Threat Labs debuts a new multi-part blog series called Data Talks The series features highlights of “live capture” threat research using aggregated data voluntarily reported by Bromium customers Look for deep-dives, trends, and pred… Continue reading Data Talks: Bromium Analyzes Live Running Malware from a Unique Threat Vantage Point