<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Attackers Insert Themselves into the Email Conversation to Spread Malware

The “never get gifts from strangers” rule applies for suspicious email attachments as well as enterprises and SMBs alike educate their employees about the dangers lurking in cyberspace.

Read More >>
 

CoffeeShot: Avoid Detection with Memory Injection

CoffeeShot is an evasion framework that injects payload from Java-based programs into designated processes on Microsoft Windows.

Read More >>
 

Minerva’s Anti-Evasion Platform Working with Windows Defender Antivirus

Minerva’s solution augments antivirus or EPP solutions without interfering or overlapping with their functionality.

Read More >>
 

Windows Defender in the Enterprise: An EPP Product in the Making

Microsoft’s built-in and commercial technologies offer an EPP-like solution that can be attractive for organizations but can also create confusion and overlapping of features. 

Read More >>
 

Untangling the “Windows Defender” Naming Mess

Microsoft includes “Windows Defender” in names of several security capabilities that the company provides. In discussions with Minerva Labs customers and partners I’ve witnessed frequent confusion

Read More >>
 

Pimped Buhtrap Source Leaked

Following the leak of an enhanced Buhtrap malware source code, Minerva’s research team released a summary of its highlights, sharing their insights about this threat and the aftermath of the leak.

Read More >>
 

Containing and Recovering from Incidents with the Help of Minerva Labs and Carbon Black

Despite their efforts to prevent intrusions, enterprises can find themselves dealing with large-scale compromises. When the investigation reveals that numerous endpoints in the organizations are

Read More >>
 

A Historical Take on the Evolution of Endpoint Security

What makes endpoints the gateway into enterprises for so many cyber-attacks? Reviewing key events from the history of endpoint security helps shed some light on what drives attackers to target

Read More >>
 

What is an exploit kit?

In our 2017 End of Year Research Report, we found that 86% of exploit kits employed evasive tactics to avoid detection. Here’s all you need to know about exploit kits and how to address the threat.

Read More >>
 

Confronting Snake Oil Sales Tactics in Endpoint Security

How can you validate the efficacy claims of endpoint security vendors? Here's a free tool to help you out.

Read More >>
 
1 2 3 4 5

Subscribe to Our Blog