<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

ENSILO BLOG

Our Corporate Blog covers the most important cyber security breeches and attacks from around the world. More importantly, we cover what you can do to detect and prevent it from ever happening to you.

February 13 2018 -

enSilo Corporate and Product , SCADA

How Secure Are Critical Infrastructure Control Systems?

January 23 2018 -

enSilo Corporate and Product , Ransomware

Previously installed AV solution, not efficient at identifying infections, including ransomware

January 16 2018 -

enSilo Corporate and Product , Emotet Botnet

 During December 2017, Ensilo detected and blocked the spread of a malicious Word document (Maldoc) across multiple healthcare entities. The initial stage of infection was done via a spear-phishing
January 11 2018 -

enSilo Corporate and Product , Emotet Botnet

A cyber attack that hit the healthcare provider via a Christmas e-card, infected the CISO’s laptop.

Get the latest updates on breaches, protective tools, and the most important updates on cyber security attacks from around the world.

February 20 2018 -

enSilo Breaking Malware

According to the BBC, on February 12, 2018, the International Olympic committee was under a cyber-attack. This cyber-attack, had begun right before the opening ceremony of the games in Pyeongchang

September 11 2017 -

Windows , documentation , enSilo Breaking Malware

TL;DR: Security vendors and kernel developers beware – a programming error in the Windows kernel could prevent you from identifying which modules have been loaded at runtime. And the fix for it isn’t

September 05 2017 -

Windows , documentation , enSilo Breaking Malware

TL;DR: Security vendors and kernel developers beware – a programming error in the Windows kernel could prevent you from identifying which modules have been loaded at runtime.

November 24 2016 -

Vulnerabilities , Windows , code injection , elevation , command injection , UAC , variables , enSilo Breaking Malware

Windows environment variables can be used to run commands and can also be used to bypass UAC, allowing an attacker with limited privileges to take complete control of the system. This code leverages