<img height="1" width="1" alt="" style="display:none" src="https://www.facebook.com/tr?id=619966238105738&amp;ev=PixelInitialized">

enSilo protects against “WannaCry” and stolen NSA Tools out of the box

Cyber-Security in 120 Secs:  Hacking Presidential Elections

This week we saw the hacking records in an attempt to send a curve ball to the French presidential election; Microsoft patched a vulnerability that Google researchers calling it “the worst Windows vulnerability in recent memory”;...

Cyber-Security in 120 Secs:  Intel's 9 Year Old Flaw

This week, Intel issued a security advisory on a 9-year old critical CPU vulnerability that can be patched with a system firmware update;  Texas based, Sabre Corporation is investigating a possible point-of-sale breach;  Hacking group, The...

Cyber-Security in 120 Secs:  The Threat is Real

This week we began seeing the domino effect of the NSA hacking tools that were released 2 weeks ago;   Chipotle Mexican Grill reported a breach on their payment system (PoS); Verizon's Data Breach was released and provides new insights...

NSA Tools vs. enSilo

See enSilo take down a nation-state quality attack tool, and stop it from stealing information on a compromised victim machine.

 

 

 

 

 

Cyber-Security in 120 Secs:  Exploits Gone Wild

This week we saw the effect of stolen hacking tools exposed by the Shadow Brokers,  InterContinental Hotels Group (IHG) released the actual number of hotels breached from 2016;  Healthcare breaches jumped in March 2017, compared to...

ShadowGroup Reveals All? Initial Analysis of the Equation Group Dump

 

On Good Friday, April 14, The Shadow Brokers released to the public a bunch of powerful Windows’ exploits, tools and exploit kits used by The Equation Group – the group supposedly behind the NSA.

We’re currently analyzing the data, and...

Cyber-Security in 120 Secs:  Cyberespionage Campaign Exposed

This week we saw a detailed report on the exposure of a cyberespionage campaign drived by suspected Chinese hacking group, APT10;  lack of cybersecurity resources is resulting in cybersecurity departments having to ignore security alerts;...

Cyber-Security in 120 Secs: : Data Breach Starts with Exploiting Vulnerabilities

This week we saw different vulnerabilities of different degrees disclosed to vendors with an effort to patch; with the frequency of data breaches, insurance companies are finding loop holes not to cover data breach costs; Trump extends...

NGAV & You. The Simple and the Complex

So, here at enSilo we’ve been big proponents of peeling back all the layers of security you need to protect your enterprise. We believe, and continue to prove that our endpoint solution is one of the only means of protection that most...