ENSILO BLOG

You are Reading:  

FindADetour: The Tool that Tests for Vulnerable Microsoft's Detours

Today’s Microsoft September Patch Tuesday includes a patch to what they had tagged as a fix for Microsoft Office. Behind the scenes, however, that fix extends beyond Microsoft Office to hundreds...

Read More

Cyber-Security in 120 Secs: The OPM Breach Report

This week, the U.S. House Oversight & Government Reform Committee concluded in a report based on the timeline of the events that led to the OPM breach - “OPM jeopardized U.S. national security for...

Read More

Cyber-Security in 120 Secs: Voting Databases Get Targeted

This week we saw activity that may concern voters in the upcoming presidential election with 3 different voter databases reported being compromised; Dropbox and Last.fm were both breached in 2012...

Read More

How is enSilo Taking on the Global Market? Read Our Fortune Article

enSilo is growing! ...and having an international cyber-security team is critical to our success.

Read More

Everything You Always Wanted to Know about Ransomware but Were Afraid to Ask

BadBlock, Cerber, Chimera, CoinVault, Crypt0L0cker, CryptoJoker, CTB-Locker, Jigsaw, KeRanger, Locky, NanoLocker, Petya, Samas, TeslaCrypt, zCrypt… these are just a few out of the hundreds of...

Read More

Cyber-Security in 120 Secs: The Shadow Brokers Release NSA Tools

This week an apparent hacking group released NSA tools that prove that the agency hoarded 0-days in security products, 20 HEI Hotel properties were hacked, and WikiLeaks has reportedly been...

Read More

Adding UAC Bypass to the Attacker’s Tool Set

Recently enSilo researchers, as part of our ongoing quest for endpoint protection, revealed a new way that attackers can bypass Microsoft’s User Access Control (UAC) mechanisms.

Read More

Elastic Boundaries – Elevating privileges by environment variables expansion

Even though any process is provided with variables from its environment, they are often overlooked by users, developers and sometimes even the OS itself.

Read More

Cyber-Security in 120 Secs: Project Sauron

This week’s events were led by a state-sponsored malware dubbed "Project Sauron" AKA "Strider, that was successfully hiding out for at least 5 years prior to being discovered, Oracle-owned MICROS...
Read More

CyberSecurity in 120 Secs: The Comeback of Gozi Malware

This week we saw Gozi malware making a comeback, a huge increase in C & C servers using SSL cloaking malware, and Banner Health was compromised with 3.7M patients being affected. (NOTE: enSilo ...

Read More

SANS review of ensilo

CATEGORIES

FEATURED ARTICLES

tag cloud