enSilo, a unified endpoint security platform providing pre and post infection detection and prevention capabilities to protect enterprises against breaches. enSilo includes EPP (Endpoint Protection Platform) capabilities, such as NGAV, and EDR (Endpoint Detection Response) features with real-time blocking of malware and orchestration
Today, a rollout of vulnerabilities and hardware backdoors affecting AMD Ryzen, Ryzen Pro and EPYC processors were released dubbed, Chimera, Ryzenfall, Fallout and Masterkey. It’s also possible that other motherboards with the ASMedia chipsets are affected by these vulnerabilities. The impact of these vulnerabilities is more severe than
The New York State Department of Financial Services (NYSDFS) urges all regulated institutions that have not yet done so, to adopt a cybersecurity program. The Financial Services Law is responding to the dramatic increase in cyber threats and cyber attacks that can cause significant financial loss for the Department of Financial Services (DFS).
This year is coming to an end. The media headlines were constantly reporting massive attacks and breaches. We expect nothing less in 2018.
So, if you’ve been keeping up with current events, you know that a nasty bit of malware backed by nation state quality tools just had its way with more than 70,000 systems worldwide. It was an ugly weekend for a lot of IT organizations in industries from healthcare to logistics to government services.
Just weeks after the Shadow Brokers released the NSA Tools, the world has had its first taste of just how effective threats built with these tools can be. Beginning early on May 12th, a ransomware variant using the EternalBlue exploit for Microsoft Windows, began spreading like wildfire, locking down businesses and users in more than 90
So, here at enSilo we’ve been big proponents of peeling back all the layers of security you need to protect your enterprise. We believe, and continue to prove that our endpoint solution is one of the only means of protection that most companies will ever need.
In late 2016, enSilo researchers shared AtomBombing with the security world. More of a “proof of concept” than an actual exploit, AtomBombing took advantage of Microsoft Windows built-in atom tables that would allow specific API calls to inject code into the read-write memory space of a targeted process.
(NOTE: enSilo endpoint protection