Malware Resources

Malware news and support resources, featuring the hottest solutions, technologies and vendors in the Malware world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Malware"

Malware copies file to evade anti-virus, detection-based cybersecurity tools

Bromium
New malware technique evades detection by simply copying a file We break it down step-by-step to show you how it works Innovative hackers continue to deliver sophisticated malware that evades detection The Bromium Lab is back to break down a recent outbreak of sneaky malware, shared with us by some of our customers who caught […]

How to Secure Microsoft Edge browser downloads with Bromium Platform

Bromium
Microsoft Edge browser does not isolate web file downloads Learn how to use Bromium to isolate your Microsoft Edge web file downloads Bromium works with all Microsoft virtualization-based security (VBS) technologies Microsoft jumps on the application isolation bandwagon. In December 2017, Bromium welcomed the arrival of the Windows Defender Application Guard (WDAG) for Microsoft Edge, […]

Ransomware success and the reasons behind it

Veeam
There’s no end to ransomware in sight. It’s a simple enough attack — install malware, encrypt data/system, and ask for the ransom — so why aren’t we stopping ransomware?  Security vendors are keenly aware of the issue, as well as the attack vectors and methods, but can’t seem to stay a step ahead, causing ransomware […]

Bromium Now Provides Application Isolation for Citrix XenServer 7.3

Bromium
Bromium now supports Citrix XenServer 7.3 nested virtualization with superior performance. Use application isolation to stop common attack vectors that layered defenses miss. Real-time, high-fidelity alerts trigger the Bromium Sensor Network to provide extended protection. XenServer is an open source platform for cost-effective application, desktop, cloud, and server virtual infrastructures. When Bromium is used for […]

Isolate Downloads and Executables So Threats Can’t Escape

Bromium
Safely download any file from the web or a shared link, even if it is malicious Eliminate restrictive IT security policies that limit user access to downloaded files and inhibit workflows Automatically verify the integrity of downloaded files without involving the Helpdesk Most knowledge-workers are on the internet all day long, mixing business and personal […]

Bromium Honored for Excellence in Government Cybersecurity

Bromium
We have a successful track record protecting federal government customers from known and unknown attacks Leading government security awards program recognizes Bromium’s continued commitment to the public sector Bromium provides defense-grade protection, allowing government employees to work as usual On January 8th, we received exciting news that we won two Government Security News Homeland Security […]

Cisco: Introducing Exploit Prevention to Stop File-Less Attacks

Cisco
In war, any good military strategist will try to exploit their enemy’s weaknesses. Cybercriminals are no different. They try to gain access to your endpoints and your sensitive data by exploiting weaknesses in your system, like a vulnerability in your software or in your operating system processes. Attackers are realizing that traditional file-based attacks that […]

Malicious Email Attachments Stopped Via Application Isolation

Bromium
Safely open any email attachment from Outlook or web mail, even if it contains malware Eliminate restrictive IT security policies that limit access to email attachments Improve user productivity by removing the risk of opening malicious email attachments Email attachments drive cybersecurity experts nuts. Despite advancements in malware detection, malicious email attachments are still getting […]

Intel chip flaw: Assess Meltdown & Spectre patch performance impacts

Lakeside Software
The Intel chip flaw in AMD, ARM and Intel processors is the latest security concern throwing Silicon Valley into a frenzy. But what is the flaw and what are Meltdown and Spectre, exactly? Here’s the quick and dirty: The Intel chip flaw consists of a couple of security vulnerabilities giving way to two methods that can expose sensitive information to […]

Protect against the undetectable Process Doppelgänging with Bromium

Bromium
Process Doppelgänging is a new code injection technique that bypasses most security tools and works on all Windows versions. Relying on detect-to-protect security solutions will leave you vulnerable to Process Doppelgänging. Bromium executes untrusted tasks in a hardware-isolated virtual machine, so you are always protected, even from zero-days and new, undetectable technique. What is Process […]

CISOs discuss micro-virtualization (VM) for endpoint security protection

Bromium
New Security Current report compiles advice and recommendations for endpoint security solutions from 13 CISOs across a variety of industries Hear why CISOs recommend application isolation for endpoint security protection See the value of application isolation provided via virtualization-based security when compared to traditional endpoint security approaches Download the report: CISOs Investigate: Endpoint Security Cloud. Mobile. […]

Cisco: No One Can Detect Threats in Your Public Cloud Like Cisco

Cisco
Whether it is misconfigured cloud assets, phishing, or malware, protecting your public cloud workloads from threats is a challenge with expensive consequences. If you have tried to extend your on-premises threat detection solutions in the public cloud, you probably know that they can be hard to manage, limited in scope, and ultimately ineffective.The good news […]

Citrix: “Use iPad Storage”/ “Use iPhone Storage” Settings – Citrix Receiver for iOS

Citrix Systems
Have you ever wondered about mapping an iOS app-related device drive onto a published app or desktop? If such a feature were available, it would make file-sharing between published apps and desktops so much easier, right? What if iOS app-related data could be easily transferred to a Mac machine via iTunes? That would really be […]

Build a Last Line of Defense Against Cyber Attacks

Dell
Channel partners looking for new revenue sources should consider qualifying to sell the Dell EMC Isolated Recovery solution. It’s the last line of data protection defense for your customers against cyber attacks that could deal their businesses a devastating blow if an attack corrupted or compromised their mission-critical or system-of-record data. Since cyber attacks are […]

Visit Our Sponsors

Close