<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

ENSILO BLOG

Our Corporate Blog covers the most important cyber security breeches and attacks from around the world. More importantly, we cover what you can do to detect and prevent it from ever happening to you.

November 21 2017 -

ENSILO CORPORATE AND PRODUCT , media

enSilo's single endpoint security agent provides both pre- and post-infection protection even when machines are compromised.

 

November 16 2017 -

ENSILO CORPORATE AND PRODUCT , Endpoint Detection and Response Solutions

enSilo Included in 2017 Gartner Market Guide for Endpoint Detection and Response (EDR) Solutions

November 14 2017 -

ENSILO CORPORATE AND PRODUCT , WannaCry

  • Effective and a completely different approach to endpoint security
  • Easy to manage~ automates on-going management of endpoint security
  • Builds confidence, leaving no after thoughts

 

October 25 2017 -

ENSILO CORPORATE AND PRODUCT , Bad Rabbit , Ransomware

WHAT IS KNOWN?

Bad Rabbit is a new ransomware campaign discovered yesterday, October 24, 2017, by ESET researchers.  

 

September 15 2017 -

Weekly Security News , ENSILO CORPORATE AND PRODUCT

This week more details on the Equifax data breach surfaced,  including the news that Equifax failed to patch a vulnerability that could have prevented the data breach;  FTC publically investigates

Get the latest updates on breeches, protective tools, and the most important updates on cyber security attacks from around the world.

September 11 2017 -

documentation , ENSILO BREAKING MALWARE

tl;dr: Security vendors and kernel developers beware – a programming error in the Windows kernel could prevent you from identifying which modules have been loaded at runtime. And the fix for it isn’t

September 05 2017 -

documentation , ENSILO BREAKING MALWARE

tl;dr: Security vendors and kernel developers beware – a programming error in the Windows kernel could prevent you from identifying which modules have been loaded at runtime.

November 24 2016 -

Vulnerabilities , bypass uac , elevation , command injection , environemt , uac , varaibles , ENSILO BREAKING MALWARE

Windows environment variables can be used to run commands and can also be used to bypass UAC, allowing an attacker with limited privileges to take complete control of the system.

November 14 2016 -

windows , Injection Techniques , code injection , atombombing, , cfg , control-flow-guard , ENSILO BREAKING MALWARE

TL;DR we show AtomBombing modifications to enable us to inject code into CFG-protected processes.

October 27 2016 -

Research , windows , Injection Techniques , code injection , atombombing, , apc , ENSILO BREAKING MALWARE

TL;DR Here’s a new code injection technique, dubbed AtomBombing, which exploits Windows atom tables and Async Procedure Calls (APC). Currently, this technique goes undetected by common security