February 27, 2017
The Chakra Exploit and the Limitations of Modern Mitigation Techniques
Posted By:
Categories :

Last November, Microsoft released a security update for Microsoft Edge which included patches for vulnerabilities CVE-2016-7200 and CVE-2016-7201, which were discovered by Google Project Zero.

Endgame Leapfrogs EDR Incumbents; Dramatically Expanding Preventions and Detections to Stop Zero Days, Malwareless Attacks, and Ransomware

Platform updates solve for industry failures by offering the only end-to-end EDR solution that instantly immobilizes attackers in time to prevent damage and loss 

October 25, 2016
Protecting the Financial Sector: Early Detection of Trojan.Odinaff

We demonstrate our early and layered detection of Odinaff, a precision toolkit used by criminal actors targeting the financial industry.

September 28, 2016
Hunting for Exploit Kits
Posted By:
Categories :

Introducing Maxwell, an automated exploit kit collection and detection tool that crawls the web hunting for exploits.

August 21, 2016
Capturing 0day Exploits with PERFectly Placed Hardware Traps

To enable earlier detection while limiting the impact on performance, we have developed a new concept we’re calling Hardware Assisted Control Flow Integrity, or HA-CFI.

Utilizing hardware to stop attackers earlier and without disruption

Instead of focusing on those known exploit techniques, our research introduces a new method for early detection and prevention of exploits without prior knowledge of the vulnerability or technique.

Endgame Exploit Prevention Technology Achieves 96% Detection of Broad Classes of Advanced Attacks

Endgame HA-CFI proven significantly more effective compared to industry standard Microsoft EMET, which achieved only 83% detection

Endgame Announces Hunt Platform 2.0, Declares IOC Independence

Hardware assisted control flow integrity (HA-CFI™) technology, Endgame MalwareScore™, and automated investigations ensure earliest detection and eviction of advanced attacks

July 20, 2016
Mitigating Stagefright Attacks with the ARM Performance Monitoring Unit
Posted By:
Categories :

Last summer, Stagefright became a household name after security researcher Joshua Drake highlighted vulnerabilities in the multimedia engine in Android that goes by the same name.

July 13, 2016
ROP is Dying and Your Exploit Mitigations are on Life Support
Posted By:
Categories :

Current defenses target obsolete offensive techniques, including return-oriented programming. These defenses have limited shelf lives or effectiveness.