You are Reading:  

Everything You Always Wanted to Know about Ransomware but Were Afraid to Ask

BadBlock, Cerber, Chimera, CoinVault, Crypt0L0cker, CryptoJoker, CTB-Locker, Jigsaw, KeRanger, Locky, NanoLocker, Petya, Samas, TeslaCrypt, zCrypt… these are just a few out of the hundreds of...

Read More

Cyber-Security in 120 Secs: The Shadow Brokers Release NSA Tools

This week an apparent hacking group released NSA tools that prove that the agency hoarded 0-days in security products, 20 HEI Hotel properties were hacked, and WikiLeaks has reportedly been...

Read More

Adding UAC Bypass to the Attacker’s Tool Set

Recently enSilo researchers, as part of our ongoing quest for endpoint protection, revealed a new way that attackers can bypass Microsoft’s User Access Control (UAC) mechanisms.

Read More

Elastic Boundaries – Elevating privileges by environment variables expansion

Even though any process is provided with variables from its environment, they are often overlooked by users, developers and sometimes even the OS itself.

Read More

Cyber-Security in 120 Secs: Project Sauron

This week’s events were led by a state-sponsored malware dubbed "Project Sauron" AKA "Strider, that was successfully hiding out for at least 5 years prior to being discovered, Oracle-owned MICROS...
Read More

CyberSecurity in 120 Secs: The Comeback of Gozi Malware

This week we saw Gozi malware making a comeback, a huge increase in C & C servers using SSL cloaking malware, and Banner Health was compromised with 3.7M patients being affected. (NOTE: enSilo ...

Read More

Cyber-Security in 120 Secs: PatchWork Group Moves to Private Sector

In this week’s news we discovered that Patchwork cyberespionage group moves its target toward the private sector, malvertising campaigns are getting more sophisticated by rogue ads being implanted...

Read More

Cyber-Security in 120 Secs: Trojanized Ammyy Admin

This week was abuzz with a malicious group taking advantage of Ammyy Admin and draining bank accounts;  CiCi’s pizza was compromised along with their PoS provider and the  discovery of code...

Read More

Intrusive Applications: 6 Security Issues to Watch Out for in Hooking

For over a year our enSilo researchers have been looking into hooking engines and injection methods used by different vendors. It all started back in 2015 when we noticed injection issue in AVG...

Read More

Captain Hook: Pirating AVs to Bypass Exploit Mitigations

TL;DR: We found 6(!) different common security issues that stem from incorrect implementation of code hooking and injection techniques. These issues were found in more than 15 different products....

Read More

SANS review of ensilo



tag cloud