Hidden Cobra’s latest attack tool
Ransomware attacks are continuing to threaten the stability of government authorities, healthcare organizations, utility companies and critical data in all industries. It has been a year since WannaCry hit and businesses are still feeling the after-effects of a worldwide ransomware attack. Now in 2018, SamSam, a targeted ransomware attack, hit
This MSSP increased its service offerings from Security Information Event Management (SIEM) to include Intrusion Prevention (IPS) and 24/7/365 incident detection and response delivered by a Security Operations Center (SOC) team. In addition to incident detection and response capabilities, the SOC team also supports compliance monitoring. The
“Nearly 98% of all recorded point of sale (POS) attacks resulting in a confirmed data breach”. Verizon Data Breach Investigations
In this post we will unveil a new process injection we call “Ctrl-Inject” that leverages the mechanism of handling Ctrl signals in console applications. While going through MSDN as part of our research we came across the following comment regarding Ctrl signal handling:
Dealing with the full capabilities of PowerShell-based, fileless attacks is daunting. The ability for PowerShell to run virtually invisibly on local systems as well as its ability to move throughout the Microsoft ecosystem makes it not only a challenging threat today, but one that will evolve rapidly.
We are proud to announce that enSilo is a recommended vendor out of 20 vendors in the (AEP) 2018 group test. enSilo received 100% malware block rate of HTTP, Email, Docs, Scripts, Offline Threats and Evasions delivery mechanisms.
To get a free copy of the NSS Labs AEP 2018 SVM (Security Value Map) and enSilo's report please visit the enSilo
Adwind is an infamous Remote Access Trojan (RAT) was first discovered in 2013. A new variant of Adwind RAT was detected and blocked by enSilo, while other anti-virus agents (AV) failed to detect, according to VirusTotal.
The manufacturing industry is continuing to be heavily targeted and is one of the most susceptible to cyber attacks, such as WannaCry and NotPetya, due the majority of manufacturers depending on legacy operating systems. Protecting legacy operating systems without an Army of people, is an obstacle due to the current landscape and finding a