<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

Cyber-Security in 120 Secs: Cozy Bear & Fancy Bear Draw on Elections

This week, hacking groups were using post-U.S. presidential themes in their spear-phishing attacks; the Identity Theft Resource Center (ITRC) reports that there have been 858 data breaches recorded this year; another ransomware attack on a...

After the (Atom)Bombing

In late October enSilo researchers discovered a new code injection technique that leveraged atom tables – an underlying component of the Windows Operating System.

While code injection isn’t new, utilizing the atom tables in Windows is. The...

Cyber-Security in 120 Secs: Election Day Brings in Cyber Fears

This week all is being focused on the U.S. presidential elections with "unprecedented efforts" being made to protect any potential attacks on the voting system; Google disclosed a Windows exploit that highlighted the importance of...

A Quick Debrief on Cyber Security for the Elected President

 

The United States is less than a week away from electing a new president. Cybersecurity has played a large part in the news leading up to the election — hacked and leaked political emails and probing of election databases — and yet there...

Cyber-Security in 120 Secs: ICO Reprimands the BBC

This week we've heard that the BBC has been involved in 169(!) reported data breaches; Habitat for Humanity has their appplicants' background checks exposed and researchers discovered an exploitable functionality dubbed "AtomBombing" that...

AtomBombing: A Code Injection that Bypasses Current Security Solutions

Our research team has uncovered new way to leverage mechanisms of the underlying Windows operating system in order to inject malicious code. Threat actors can use this technique, which exists by design of the operating system, to bypass...

Day Zero and the Death of Whitelisting

>Zero Day

Why enSilo? Easy – because we stop zero-day malware on day zero.

I mean – lots of companies say they can stop zero-day malware, and truth be told, they probably can. But they’re not going to do it when it matters, which is on day...

Cyber-Security in 120 Secs: The Strike of IoT

This week we saw the impact of a huge DDos cyber attack that hit the Internet on Friday;  CVE-2016-5195 or "Dirty COW" a vulnerability that has lasted in Linux devices since 2007 was brought to the light;  LeakedSource exposes breaches for...

Cyber-Security in 120 Secs: PoS Malware Strikes Again

This week has seen at least one reported breach caused by a PoS malware for shoppers of Vera Bradley;  according to a SANS report, the financial sector’s #1 attack threat is reported to be ransomware, causing losses up to half-million...

No Penalty for Failure

If you have data of value – and you probably do – someone is eventually going to try to steal it. Because time and technology are usually on the side of the attacker, they’ll probably be successful. It doesn’t matter that you have the...