ENSILO BLOG

Our Corporate Blog covers the most important cyber security breaches and attacks from around the world. More importantly, we cover what you can do to detect and prevent it from ever happening to you.

April 19 2018 -

cybersecurity , enSilo Corporate and Product

Dealing with the full capabilities of PowerShell-based, fileless attacks is daunting.  The ability for PowerShell to run virtually invisibly on local systems as well as its ability to move throughout

April 17 2018 -

cybersecurity , enSilo Corporate and Product

We are proud to announce that enSilo is a recommended vendor out of 20 vendors in the (AEP) 2018 group test.

To get a free copy of the NSS Labs AEP 2018 SVM (Security Value Map) please visit the NSS

April 12 2018 -

cybersecurity , enSilo Corporate and Product

Adwind is an infamous Remote Access Trojan (RAT) was first discovered in 2013.  A new variant of Adwind RAT was detected and blocked by enSilo, while other anti-virus agents (AV) failed to detect,

April 09 2018 -

POS malware , enSilo Corporate and Product

The manufacturing industry is continuing to be heavily targeted and is one of the most susceptible to cyber attacks, such as WannaCry and NotPetya, due the majority of manufacturers depending on

Get the latest updates on breaches, protective tools, and the most important updates on cyber security attacks from around the world.

September 11 2017 -

Windows , documentation , enSilo Breaking Malware

TL;DR: Security vendors and kernel developers beware – a programming error in the Windows kernel could prevent you from identifying which modules have been loaded at runtime. And the fix for it isn’t

September 05 2017 -

Windows , documentation , enSilo Breaking Malware

TL;DR: Security vendors and kernel developers beware – a programming error in the Windows kernel could prevent you from identifying which modules have been loaded at runtime.

November 24 2016 -

Vulnerabilities , Windows , code injection , elevation , command injection , UAC , variables , enSilo Breaking Malware

Windows environment variables can be used to run commands and can also be used to bypass UAC, allowing an attacker with limited privileges to take complete control of the system. This code leverages

November 14 2016 -

Windows , Injection Techniques , code injection , AtomBombing , CFG , Control Flow Guard , enSilo Breaking Malware

TL;DR: We show AtomBombing modifications to enable us to inject code into CFG-protected processes.