Capturing zero days with PERFectly placed hardware traps
Hunting Beyond the Hype: Why IOCs are Not Enough!

Latest Resources

RSA Conference 2017

Endgame will be at RSA February 13-16, 2017 at Moscone Center in San Francisco, CA.

LEARN MORE

ShmooCon 2017

Join Endgame at ShmooCon January 13-15, 2017 at the Washington DC Hilton.

LEARN MORE

Endgame and Foreign Policy Interrupted invite you to join Cyber Security Interrupted

Endgame and Foreign Policy Interrupted are bringing together a panel of experts who will draw on their backgrounds in academia, government and industry to discuss the key geopolitical trends, concerns and challenges in cybersecurity that should be prioritized by the next administration.

LEARN MORE

ENDGAME's Top 5 BLOG POSTS IN 2016

Endgame published 53 blogs in 2016 covering a variety of topics. Here's a recap of our readers' Top 5 favorite blogs.

READ MORE

Resources by Type

On-Demand Webinar: Pre-Exploit Detection and Mitigation Techniques

Current defenses target obsolete offensive techniques. This is especially true with exploit mitigations, and Return-Oriented Programming (ROP) in particular. Anti-exploit solutions need to disrupt early in the stages of exploitation to maintain an advantage. Endgame’s Hardware Assisted Control Flow Integrity (HA-CFI) stops adversaries before any code is executed.

This webinar will cover:

  • The challenges with exploit detection
  • Exploit prevention framework and mitigation techniques 
  • Endgame’s approach to pre-exploit detection

Watch Now