<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

PREVENTED! An active malware campaign using emails distributes RTF files that carry a widespread exploit. Patch at your own pace

All of Minerva customers are fully protected from this campaign as from many other Office vulnerabilities even if their systems were not patched yet – regardless of their Office Suite version and

Read More >>
 

Attackers Insert Themselves into the Email Conversation to Spread Malware

The “never get gifts from strangers” rule applies for suspicious email attachments as well as enterprises and SMBs alike educate their employees about the dangers lurking in cyberspace.

Read More >>
 

Why is Malware Able to Evade Detection?

In the context of cybersecurity, evasion is the practice of executing malicious code despite the presence of anti-malware controls. Such tactics don’t exploit fixable defects. Instead, they take

Read More >>
 

AZORult: Now, as A Signed “Google Update”

AZORult attackers continue to adjust tactics to increase the chances that they’ll evade detection. This malware is a common information stealer, capable of exfiltrating a wide range of sensitive

Read More >>
 

Ancient Chinese Wisdom vs. Cryptojacking

“Cryptojacking” campaigns misuse victims’ computational resources for mining illicit cryptocurrency profits. Below we present our forecast about malicious cryptominers in the upcoming year and

Read More >>
 

Legally Dangerous Attackers

Malicious actors are consistently and persistently looking for new avenues to compromise sensitive data and they’ve found one such entry through legal firms.

Read More >>
 

How can malware authors determine whether their tools will be detected by antivirus solutions

Malware authors work rigorously to ensure their creations will go undetected by security defenses. Though some adversaries engage in their own hands-on testing, many of them turn to third-party

Read More >>
 

Deconstructing Fileless Attacks into 4 Underlying Techniques

How can we turn discussions about the vague notion of fileless attacks into constructive, specific conversations?

Read More >>
 

How Fileless Malware Infections Start

The notion of fileless attacks describes incidents where adversaries avoid writing malicious code to disk, aiming to operate solely in memory and abuse features of applications and the OS.

Read More >>
 

Minerva’s Anti-Evasion Platform as Part of the McAfee Ecosystem

What drives two endpoint security vendors to work together? The recognition that customers will benefit from the unique advantages of each company’s technologies.

Read More >>
 
1 2 3 4 5

Subscribe to Our Blog

Topics

see all