<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

ENSILO BLOG

You are Reading:  

Udi Yavo, CTO, enSilo

Udi Yavo, CTO, enSilo
Proficient in OS-internals, code analysis and exploitation. Low-level researcher. Contact me.

latest post by Udi Yavo, CTO, enSilo

enSilo protects against “WannaCry” and stolen NSA Tools out of the box

Read More

ShadowGroup Reveals All? Initial Analysis of the Equation Group Dump

 

On Good Friday, April 14, The Shadow Brokers released to the public a bunch of powerful Windows’ exploits, tools and exploit kits used by The Equation Group – the group supposedly behind the NSA.

Read More

WhatsApp With That: One Says Backdoor, the Other Says Feature

WhatsApp was under the limelight this week with news that they have allowed government backdoor access.

Read More

Predictions 2017: Goodbye Flash. Hello Jscript.

In 2017, we predict that as Flash phases out, JScript will take its place as the leading browser-exploitation vector.

Read More

Predictions 2017: Security Moves Down the Stack

In 2017, we predict that security – the good and the bad – will be moving down the stack.

Both sides — defense vs offense — are moving down the stack. On one side: the confidentiality, integrity...

Read More

Predictions 2017: Targeted Ransomware

In 2017, we predict that ransomware authors will target mission-critical servers and PCs - within targeted departments.

By holding these sensitive devices hostage, ransomware authors will be...

Read More

A Quick Debrief on Cyber Security for the Elected President

 

The United States is less than a week away from electing a new president. Cybersecurity has played a large part in the news leading up to the election — hacked and leaked political emails and...

Read More

FindADetour: The Tool that Tests for Vulnerable Microsoft's Detours

Today’s Microsoft September Patch Tuesday includes a patch to what they had tagged as a fix for Microsoft Office. Behind the scenes, however, that fix extends beyond Microsoft Office to hundreds...

Read More

Intrusive Applications: 6 Security Issues to Watch Out for in Hooking

For over a year our enSilo researchers have been looking into hooking engines and injection methods used by different vendors. It all started back in 2015 when we noticed injection issue in AVG...

Read More

Captain Hook: Pirating AVs to Bypass Exploit Mitigations

tl;dr: We found 6(!) different common security issues that stem from incorrect implementation of code hooking and injections techniques. These issues were found in more than 15 different products....

Read More

CATEGORIES

FEATURED ARTICLES

tag cloud