CyberSecurity in 120 Secs: Ransomware, CVS, and More

Weekly Security News, enSilo Corporate and Product, Ransomware, PCI DSS, Android, Lockerpin.A, CVS

We're excited to kickstart our weekly roundup of security news from the past week. In these weekly summaries we'll highlight significant points, so you get the most from all the news in just 120 seconds.

Ready, get set, go!

Read More

The Top 10 BlackHat 2015 Talks for the Security Researcher

Research, enSilo Corporate and Product

BlackHat talks come in all shapes and sizes – from the philosophical keynotes and high-level to the ultra techie. Narrowing down the list of talks isn’t easy so I chose mine based on their technology flare. If you’re more of the techie sort, I hope this list helps you out as well. The only thing to note is that some unfortunately overlap so

Read More

MS Patch Tuesday: A Look into 4 Vulnerabilities in the Windows Kernel

Research, enSilo Corporate and Product

Today’s Microsoft Patch Tuesday includes a patch for CVE-2015-2363, an IMPORTANT-rated exploitable privilege escalation vulnerability which we have responsibly disclosed to Microsoft. CVE-2015-2363 is a nearly 20 year-old vulnerability, located in most Windows systems since Windows NT 4.0 and up to Windows 8.

Read More

Class Dismissed: 4 Use-After-Free Vulnerabilities in Windows

Vulnerabilities, Windows, vulnerability, exploit, enSilo Breaking Malware, enSilo Corporate and Product

Introduction

Today, Microsoft released their latest Patch Tuesday. This Patch includes a fix for CVE-2015-2363, a complementary patch to CVE-2015-2360 from last month. The two CVEs together bundles within themselves IMPORTANT-rated exploitable vulnerabilities which we responsibly disclosed to Microsoft.

Read More

Our Series A Funding: What it Means for Our Customers and Prospects

Business, enSilo Corporate and Product

Today, we are announcing the completion of our A Round funding led by Lightspeed Venture Partners with an additional investment from our existing backer, Carmel Ventures. The latest threat campaigns and breaches have demonstrated that where there’s a will, there’s a way – a persistent, targeted attacker will eventually succeed to infiltrate an

Read More

MS June Patch Tuesday: Double Trouble in the Microsoft Kernel.

Research, enSilo Corporate and Product

Today is the Microsoft June Patch Tuesday. In particular, the patch includes two kernel exploitable vulnerabilities that enSilo researchers had reported to Microsoft just less than two weeks ago. Both vulnerabilities were filed together under CVE-2015-2360, ranked as IMPORTANT. These two vulnerabilities date back to the old – yet already

Read More

“Selfie”: A Tool to Unpack Self-Modifying Code using DynamoRIO

tools, Windows, Malware, enSilo Breaking Malware, enSilo Corporate and Product, Endpoint Protection

TL;DR: In this blog post we describe Selfie, a tool we have developed that automates finding the OEP for a majority of malwares packed with self-modifying code. The Selfie tool is now open-sourced, compiled to 32-bit, and can be found here.

Read More

The 10 RSA Talks to Get the Most Out of the Conference

Industry, enSilo Corporate and Product

I’ve just completed one of the most difficult pre-RSA tasks… narrowing the list of talks to attend during the RSA SF 2015. I was able to nail mine down to the 10 that I found not only most beneficial, but also engaging.

I tried spreading it over the week as much as possible to fit in also meetings and walk the expo floor. Hopefully, this list

Read More

NanoCore RAT: It’s Not 100% Original

Research, Windows, Malware, RAT, enSilo Corporate and Product

A few days ago, a cracked full-version of the NanoCore Remote Access Trojan (RAT) tool was leaked.

With scarce existing documentation of NanoCore we decided to investigate ourselves NanoCore’s core set of features and techniques. (We do this as part of enSilo’s development of the best endpoint security software.) What we found was that although

Read More

AVG: A Case-Study in Vulnerability Disclosure

Research, enSilo Corporate and Product

Our research team responsibly disclosed a severe vulnerability in AVG Internet Security 2015 build 5736 + Virus database 8919 released January 13th 2015.

Within just two days of disclosure, on Thursday, March 12th, 2015 – AVG released a patch to its user base.

AVG’s response to this flaw is something we should all learn from. It stands in dark

Read More