Not yet another Death Note caused by the Ryuk Ransomware

enSilo Corporate and Product, cybersecurity

SUMMARY

Your network has been penetrated, your valuable files have been encrypted and the only way to decrypt your data is by paying an unknown entity a ransom via Bitcoins. This is not the beginning of a science fiction story as many of us would think. In recent years, organizations have been facing this harsh reality due to ransomware

Read More

enSilo Protects Against Shamoon-Related Attacks

enSilo Corporate and Product

Discovered by the security community earlier this month, the third version of Shamoon malware destroys files and data on all systems before overwriting the MBR. enSilo prevents attacks by Shamoon malware.  
Read More

2019 Security Predictions

enSilo Corporate and Product

In 2018, the world witnessed many significant breaches and new types of fast-moving, sophisticated endpoint security threats ranging from the use of Powershell through fileless malware attacks to hardware compromised within the supply chain. Here’s a look back at the year that was and our predictions for what to expect in 2019.
Read More

The Gartner Market Guide for Endpoint Detection and Response Solutions Validates the enSilo Approach to Protecting Endpoints

enSilo Corporate and Product, cybersecurity

The latest version of the Gartner Market Guide for Endpoint Detection and Response Solutions validates the need for real-time prevention and why the detect-then-decide approach simply can’t keep up with today’s threats. 

Read More

City of Atlanta Ransomware Attack

cybersecurity, enSilo Corporate and Product

Overview

On March 22 of this year, the City of Atlanta experienced one of the most devasting and costly ransomware attacks to date in the US. For one week, the city floundered while five of its thirteen local government departments were held hostage, unable to perform their functions. For city employees logging-in to their devices that morning,

Read More

Exactis Data Breach: The Risk of Data Exposure Without Endpoint Protection

cybersecurity, enSilo Corporate and Product

Earlier this year Exactis, a Florida-based marketing data broker, had their database (close to 340 million individual records) exposed on a public server. Though hacking efforts didn't expose the data, the personally identifiable information was inexplicably left on an unsecured server without basic security safeguards. 
Read More

Game of Trojans: Dissecting the #Khalesi Infostealer Malware

Business, Industry, enSilo Corporate and Product, Malware

Summary

During the end of August 2018, the security community discovered an infostealer malware in the wild named Khalesi. This malware was identified by the security community as part of the Kpot malware campaign. Some of the recent Khalesi variants in this campaign were compiled with a Visual Basic 6 (VB6) compiler while the others were

Read More

enSilo Honored as Gold Winner in the 10th Annual 2018 Golden Bridge Awards®in the Endpoint Security Solution Category

enSilo Corporate and Product

enSilo has earned the prestigious Gold status in the Golden Bridge Awards® for their  product in the Endpoint Security Solution Innovations category. The coveted annual Golden Bridge Awards program encompasses the world’s best in organizational performance, innovations, products and services, executives and management teams, women in business

Read More

enSilo Blocks LokiBot Infostealer

cybersecurity, enSilo Corporate and Product

enSilo’s Endpoint Security Platform detected and blocked a new variant of the LokiBot malware in July, 2018. During that time, VirusTotal exhibited only twelve commercial Anti-Virus (AV) applications having a virus definition for this malware, which indicates a low detection rate:

Read More

Turning (Page) Tables: Bypassing Kernel Mitigations to Successfully Escalate Privileges

enSilo Breaking Malware, cybersecurity, enSilo Corporate and Product

On August 8th, at the BSides Conference in Las Vegas, we unveiled a new exploitation technique against the Microsoft Windows operating system. It's a general technique to leverage with kernel vulnerabilities and make privilege escalation easier.

Read More