<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

New MirrorBlast Malware Phishing Campaign Using Rebol-View Software

MirrorBlast malware is a trojan that is known for attacking users’ browsers. It usually pretends to be a legitimate browser add-on however it has now evolved additional capabilities, whereby other . . .

 

Two Trickbot gang members arrested, but the malware is still spreading

Trickbot malware has been with us since 2016. It started as a banking trojan, targeting financial services and users to steal banking data. However, over the years, it has evolved into . . .

 

What You Should Know: Protect Against Common Ransomware Attack Methods

It’s easy enough to understand what ransomware does: It holds your data for ransom by encrypting it until you pay a fee to the threat actors.

 

Phishing Attacks and Minerva Armor

Most threat actors these days are more mature than they were before. An organization will find out about a cyber attack on its network, in the late stages of the attack, when the damage has . . .

 

Vidar Stealer Evasion Arsenal

Vidar Stealer is not new to our world. It is known for stealing sensitive information such as banking details, IP addresses, saved passwords, browser history, login credentials, and recently, . . .

 

The Change: Government Agencies And Remote User Protection

In the early days of the Covid-19 pandemic, when organizations rapidly shifted their employees to remote work, the focus was typically on maintaining business continuity first and foremost. . . .

 

BlackMatter - The New Star Of Ransomware

After the demise of the DarkSide ransomware affiliate program, a vacuum was left in the market. This space was promptly filled by new groups such as Lockbit and BlackMatter. BlackMatter, the . . .

 

Become A VIP Victim With New Discord Distributed Malware

Threat actors are always looking for a way to avoid detection, and one of the most popular techniques is to use legitimate services to mask malicious network activity. A recent trend is to abuse . . .

 

Thwarting Jupyter Stealer

Jupyter Stealer is an evolving info stealer that is commonly spread using backdoored installations. We have recently encountered a new and improved version of this malware, which allows its . . .

 

Supply Chain Attack – We Can’t Predict It, But We Can Stop It

Modern technology is making our life easier, but it also makes us more vulnerable in the face of the attacker. From multinational organizations, all the way down to individuals with a simple smart . . .

 

Why Ransomware Protection Is A Vital Part of Healthcare

The healthcare industry is one of the most targeted verticals for ransomware attacks. According to IBM’s data breach report, in healthcare, 50% of data breaches [in the US] were due to malicious . . .

 

Taurus Loader: User-Guided Infection

In recent months we have seen a spike in events associated with Taurus loader. Although Taurus has already been covered extensively by researchers, we think its spreading method was left untouched . . .

 
1 2 3 4 5

Stay Informed

Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.

Categories

see all