“Nearly 98% of all recorded point of sale (POS) attacks resulting in a confirmed data breach”. Verizon Data Breach Investigations
In this post we will unveil a new process injection we call “Ctrl-Inject” that leverages the mechanism of handling Ctrl signals in console applications. While going through MSDN as part of our research we came across the following comment regarding Ctrl signal handling:
Dealing with the full capabilities of PowerShell-based, fileless attacks is daunting. The ability for PowerShell to run virtually invisibly on local systems as well as its ability to move throughout the Microsoft ecosystem makes it not only a challenging threat today, but one that will evolve rapidly.
We are proud to announce that enSilo is a recommended vendor out of 20 vendors in the (AEP) 2018 group test. enSilo received 100% malware block rate of HTTP, Email, Docs, Scripts, Offline Threats and Evasions delivery mechanisms.
To get a free copy of the NSS Labs AEP 2018 SVM (Security Value Map) and enSilo's report please visit the enSilo
Adwind is an infamous Remote Access Trojan (RAT) was first discovered in 2013. A new variant of Adwind RAT was detected and blocked by enSilo, while other anti-virus agents (AV) failed to detect, according to VirusTotal.
The manufacturing industry is continuing to be heavily targeted and is one of the most susceptible to cyber attacks, such as WannaCry and NotPetya, due the majority of manufacturers depending on legacy operating systems. Protecting legacy operating systems without an Army of people, is an obstacle due to the current landscape and finding a
We are honored to have received such positive accolades from SC Magazine on the enSilo endpoint security platform. Below are some small takeaways from today’s article.
enSilo Provides a Comprehensive Pre and Post Infection Protection Platform All In One Single Agent Centrally Managed By a Unified Console. Independent IT Security Institute Certifies enSilo’s Pre Infection Next Generation Antivirus Protection Feature to Block 100% of Known Malware Attacks