ENSILO BLOG

You are Reading:  

Customers Say it Best - Healthcare

A cyber attack that hit the healthcare provider via a Christmas e-card, infected the CISO’s laptop.

Read More

DON’T HAVE A MELTDOWN OVER SPECTRE

The world has been informed of Spectre and Meltdown.  Spectre and Meltdown are hardware flaws and/or vulnerabilities that allow an attacker to run unprivileged code to read from privileged memory....

Read More

Cybersecurity Predictions 2018

This year is coming to an end.  The media headlines were constantly reporting massive attacks and breaches. We expect nothing less in 2018. 

Read More

Excel ScriptLet Attack Blocked By enSilo

On December 8, 2017, enSilo, a unified endpoint security platform that provides both pre- and post-infection protection in real-time, blocked a new attack technique used to exploit the linked file...

Read More

enSilo’s Process Doppelganging Security Check

WHAT IS PROCESS DOPPELGANGING?

Process Doppelganging is a technique that allows bypassing real-time file scanning of all tested AV and NGAV products on Microsoft Windows starting from Windows...

Read More

Webinar: Process Doppelgänging Blocked by enSilo

enSilo is real-time endpoint security software that protects against Process Doppelganging (and lots more). See the on-demand webinar of Lost in Transaction: Process Doppelganging featured at...

Read More

Scarab Ransomware Blocked by enSilo

CUSTOMER ADVISORY WARNING: During June 2017, the Scarab ransomware was detected for the first time by several security professionals. Scarab ransomware spreads to victims across the world via...

Read More

Customers Say it Best - Hospitality

enSilo stops malware post-infection real-time from causing harm and tampering or exfiltrating data from your endpoint.

Read More

CryFile - From 0-Day to detection in 48 hours

CUSTOMER ADVISORY WARNING: A new variant of CryFile ransomware.
Read More

Customers Say it Best - Media Broadcast

enSilo's single endpoint security agent provides both pre- and post-infection protection even when machines are compromised.

Read More

SANS review of ensilo

CATEGORIES

FEATURED ARTICLES

tag cloud