ENSILO BLOG

Our Corporate Blog covers the most important cyber security breaches and attacks from around the world. More importantly, we cover what you can do to detect and prevent it from ever happening to you.

July 10 2018 -

cybersecurity , enSilo Corporate and Product

In June 2018, Cybereason posted a blog about a malicious Dynamic-Link Library (DLL) file exhibiting a behavior associated with credential theft. Their analysis discovered that the malicious DLL

June 08 2018 -

cybersecurity , enSilo Corporate and Product

Ransomware attacks are continuing to threaten the stability of government authorities, healthcare organizations, utility companies and critical data in all industries. It has been a year since

May 22 2018 -

cybersecurity , enSilo Corporate and Product

This MSSP increased its service offerings from Security Information Event Management (SIEM) to include Intrusion Prevention (IPS) and 24/7/365 incident detection and response delivered by a Security

May 16 2018 -

enSilo Corporate and Product

“Nearly 98% of all recorded point of sale (POS) attacks resulting in a confirmed data breach”.  Verizon Data Breach Investigations

Get the latest updates on breaches, protective tools, and the most important updates on cyber security attacks from around the world.

September 11 2017 -

Windows , documentation , enSilo Breaking Malware

TL;DR: Security vendors and kernel developers beware – a programming error in the Windows kernel could prevent you from identifying which modules have been loaded at runtime. And the fix for it isn’t

September 05 2017 -

Windows , documentation , enSilo Breaking Malware

TL;DR: Security vendors and kernel developers beware – a programming error in the Windows kernel could prevent you from identifying which modules have been loaded at runtime.

November 24 2016 -

Vulnerabilities , Windows , code injection , elevation , command injection , UAC , variables , enSilo Breaking Malware

Windows environment variables can be used to run commands and can also be used to bypass UAC, allowing an attacker with limited privileges to take complete control of the system. This code leverages

November 14 2016 -

Windows , Injection Techniques , code injection , AtomBombing , CFG , Control Flow Guard , enSilo Breaking Malware

TL;DR: We show AtomBombing modifications to enable us to inject code into CFG-protected processes.