ENSILO BLOG

You are Reading:  

Turning (Page) Tables: Bypassing Kernel Mitigations to Successfully Escalate Privileges

On August 8th, at the BSides Conference in Las Vegas, we unveiled a new exploitation technique against the Microsoft Windows operating system. It's a general technique to leverage with kernel...

Read More

Supporting the Growth of Managed Detection and Response Services

Gartner says it best in its most recent Market Guide for Managed Detection and Response (MDR) Services: “Managed detection and response improves threat detection monitoring and incident response...

Read More

enSilo Terminates DLL Search Order Hijacking

In June 2018, Cybereason posted a blog about a malicious Dynamic-Link Library (DLL) file exhibiting a behavior associated with credential theft. Their analysis discovered that the malicious DLL...

Read More

enSilo BLOCKS Hidden Cobras Latest Attack Tool

Hidden Cobra’s latest attack tool

Read More

5 WAYS TO TACKLE RANSOMWARE ATTACKS

Ransomware attacks are continuing to threaten the stability of government authorities, healthcare organizations, utility companies and critical data in all industries. It has been a year since...

Read More

Customers Say It Best - Managed Security Service Provider

This MSSP increased its service offerings from Security Information Event Management (SIEM) to include Intrusion Prevention (IPS) and 24/7/365 incident detection and response delivered by a...

Read More

enSilo Protects: Point of Sale (POS)

“Nearly 98% of all recorded point of sale (POS) attacks resulting in a confirmed data breach”.  Verizon Data Breach Investigations

Read More

ensilo blocks SYNACK RANSOMWARE

 

Read More

Ctrl-Inject

In this post we will unveil a new process injection we call “Ctrl-Inject” that leverages the mechanism of handling Ctrl signals in console applications. While going through MSDN as part of our...

Read More

How to Handle the Increase in PowerShell Attacks ?

Dealing with the full capabilities of PowerShell-based, fileless attacks is daunting.  The ability for PowerShell to run virtually invisibly on local systems as well as its ability to move...

Read More

SANS review of ensilo

CATEGORIES

FEATURED ARTICLES

tag cloud