<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Conti Ransomware - Built to bypass EDRs, Prevented by Minerva

Over the past few months, a new ransomware threat has appeared, Conti ransomware. The ransomware has already been thoroughly researched by Carbon Black’s research team. Recently, we came across a

Read More >>
 

Don't be next! Prevent DarkSide's mutating mutex with Minerva

DarkSide ransomware is a new and dangerous malware that threatens its victims not only with its data encryption functionality, but also with leaking the stolen information on the dark web. So far

Read More >>
 

Lucifer, Prevented since the very beginning (2016)

In a very recent Unit42 report by Palo Alto Networks, a new version of a malware dubbed as Lucifer was analyzed. 

Read More >>
 

Watch Your Six! Minerva Prevented a Built-in Keylogger in HP Driver

Recently as COVID-19 spreads, more organizations are enforcing remote work-from-home, making employees home computers more vulnerable than ever to cyberattacks. 

Minerva is the only vendor that

Read More >>
 

Minerva’s Anti-Evasion Platform Working with Windows Defender Antivirus

Minerva’s solution augments antivirus or EPP solutions without interfering or overlapping with their functionality.

Read More >>
 

GermanWiper - yet another ransomware PREVENTED

All business organizations protected by MINERVA are safe! No infection or data loss accrued thanks to Minerva’s Double Layered Ransomware Protection. According to the media, this is a new type of

Read More >>
 

Sodinokibi - Yet another ransomware prevented!

To all of our customers, OEM and MSP/MSSP partners,

Read More >>
 

PREVENTED! An active malware campaign using emails distributes RTF files that carry a widespread exploit. Patch at your own pace

All of Minerva customers are fully protected from this campaign as from many other Office vulnerabilities even if their systems were not patched yet – regardless of their Office Suite version and

Read More >>
 

Attackers Insert Themselves into the Email Conversation to Spread Malware

The “never get gifts from strangers” rule applies for suspicious email attachments as well as enterprises and SMBs alike educate their employees about the dangers lurking in cyberspace.

Read More >>
 

Why is Malware Able to Evade Detection?

In the context of cybersecurity, evasion is the practice of executing malicious code despite the presence of anti-malware controls. Such tactics don’t exploit fixable defects. Instead, they take

Read More >>
 

AZORult: Now, as A Signed “Google Update”

AZORult attackers continue to adjust tactics to increase the chances that they’ll evade detection. This malware is a common information stealer, capable of exfiltrating a wide range of sensitive

Read More >>
 

Ancient Chinese Wisdom vs. Cryptojacking

“Cryptojacking” campaigns misuse victims’ computational resources for mining illicit cryptocurrency profits. Below we present our forecast about malicious cryptominers in the upcoming year and

Read More >>
 
1 2 3 4 5

Subscribe to Our Blog

Topics

see all