Microsoft Tears off the Band-Aid with EMET

Microsoft extended the end of life deadline on EMET to July 2018, but experts say its usefulness as a mitigation toolkit has been limited for some time. Continue reading Microsoft Tears off the Band-Aid with EMET

Utilizing hardware to stop attackers earlier and without disruption

Too often the defense community makes the mistake of focusing on the “what,” without considering and truly understanding the “why.” This mindset often leads to the development of technologies based on known exploitation techniques, which are ineffective and easily circumvented shortly after their release. Instead of focusing on those known exploit techniques, our research introduces a new method for early detection and prevention of exploits without prior knowledge of the vulnerability or technique. Our hardware-assisted … More Continue reading Utilizing hardware to stop attackers earlier and without disruption

New Technique Checks Mitigation Bypasses Earlier

Researchers at Endgame are expected at Black Hat to introduce Hardware Assisted Control Flow Integrity (HA-CFI), which leverages features in the micro-architecture of Intel processors for security. Continue reading New Technique Checks Mitigation Bypasses Earlier

Latest TeslaCrypt Targets New File Extensions, Invests Heavily in Evasion

Researchers at Endgame have found new versions of TeslaCrypt in the past few weeks that target a host of new and unusual file extensions, and deploy new obfuscation and evasion techniques. Continue reading Latest TeslaCrypt Targets New File Extensions, Invests Heavily in Evasion