<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

AtomBombing: A Code Injection that Bypasses Current Security Solutions

Our research team has uncovered new way to leverage mechanisms of the underlying Windows operating system in order to inject malicious code. Threat actors can use this technique, which exists by design of the operating system, to bypass...

Day Zero and the Death of Whitelisting

>Zero Day

Why enSilo? Easy – because we stop zero-day malware on day zero.

I mean – lots of companies say they can stop zero-day malware, and truth be told, they probably can. But they’re not going to do it when it matters, which is on day...

Cyber-Security in 120 Secs: The Strike of IoT

This week we saw the impact of a huge DDos cyber attack that hit the Internet on Friday;  CVE-2016-5195 or "Dirty COW" a vulnerability that has lasted in Linux devices since 2007 was brought to the light;  LeakedSource exposes breaches for...

Cyber-Security in 120 Secs: PoS Malware Strikes Again

This week has seen at least one reported breach caused by a PoS malware for shoppers of Vera Bradley;  according to a SANS report, the financial sector’s #1 attack threat is reported to be ransomware, causing losses up to half-million...

No Penalty for Failure

If you have data of value – and you probably do – someone is eventually going to try to steal it. Because time and technology are usually on the side of the attacker, they’ll probably be successful. It doesn’t matter that you have the...