<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Analyzing an AZORult Attack – Evasion in a Cloak of Multiple Layers

AZORult is an info-stealing malware, that has evolved over time to become a multi layered feature, that improves its chance not to get caught.

Read More >>
 

What to expect from your endpoint security solutions? Security coverage alone isn’t enough

We recently surveyed 600 security professionals to hear their view on the state of endpoint security in 2018. Here’s what we learned.

Read More >>
 

MSPs: Defining Your Security Services Commitments

If you’re thinking of adding on a security services offering to your practice or already have such a solution, confirm that your customers know what to expect from your security service.

Read More >>
 

MSPs – 3 Steps to Making Security Profitable and Valuable

If you’re like most MSPs, you’re always looking to increase either the scope of current services within a given customer or are looking to expand your service offerings.

Read More >>
 

GhostMiner: Cryptomining Malware Goes Fileless

Cybercriminals are increasingly relying on malicious cryptominers as a way of making money online, often shifting from using ransomware or diversifying revenue streams.

Read More >>
 

Endpoint Vaccination: Your IR Teams will Thank You

Contain the next malware outbreak and learn how endpoint vaccination works magic in your incident response.

Read More >>
 

Why are Municipalities and Governmental Services a Prime Target for Cybercriminals?

Threats to state and local governments can be prevented before having to pay a fortune in remediation costs. Learn why municipalities and governmental services are a prime target for

Read More >>
 

Mimicry: The Evolution of Deceptive Defenses and Attacks

Many aspects of cyber-attacks resemble time-tested techniques found in nature. Self-propagating malware is reminiscent of biological viruses spreading from one organism to another, or malicious

Read More >>
 

The Upsurge in Evasive Malware

At this point in our industry’s history, pretty much every IT professional is very aware of the need for a security strategy that not only protects against current threats, but one that’s also

Read More >>
 

Protecting ATMs Against Jackpotting Attacks

Jackpotting attacks against ATMs are highly profitable, and often involve both logical and physical attack vectors. How can banks and ATM manufacturers safeguard their systems against such

Read More >>
 
1 2 3 4 5