<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Ripping and Replacing AV - be careful what you wish for

For too long, antivirus vendors didn’t innovate fast enough, and more and more companies started to question the effectiveness of AV. Understandably, there are now several vendors out there . . .

 

Prevent or Detect: The Battle Against Memory Injection

In any cyber attack, the longer an attacker can remain undetected, the more pervasive, intrusive, and destructive they can be. So, the search is constantly on for new ways to compromise and take . . .

 

Preventing the Latest Fileless Attack Endpoint Detection Tools Could Not Stop

Throughout the history of combat and military engagement, there are plenty of stories how a smaller force was able to overcome a larger force through the use of trickery and deception.

 

The Drawbacks of Using Code Snippets from the Web

Being a software engineer nowadays isn’t what it used to be a couple of decades ago – a lot of questions have a solution or a code example available online. And while some of us may take code . . .

 

New Petya Ransomware Attack PREVENTED by Minerva Labs

During the last 12 hours, a new ransomware campaign is causing mayhem in what appears to be a one of the most catastrophic and aggressive ransomware attacks ever seen.

The ransomware is . . .

 

Adwind Malware and other Evasive Java RATs

Modern cyber-attacks against well-defended enterprises are not as simple as you may think. They are comprised of many components in charge of different tasks.  For example, if an attacker wishes . . .

 

UIWIX – Evasive Ransomware Exploiting ETERNALBLUE

Last week everybody talked about the WannaCry ransomware, a non-evasive ransomware which exploited vulnerable servers to propagate, successfully infecting anything from digital billboards to the . . .

 

Reflecting on the Endpoint Security Architecture in the Aftermath of WannaCry

The outbreak of WannaCry ransomware has caused enterprises to examine their approach to safeguarding endpoints. What controls could have dampened the worm’s propagation? What measures could . . .

 

Using Vaccination to Stop Malware in Real-Life Scenarios

Caught in the middle of a malware outbreak without sufficient preventative mechanisms, how can the organization contain the malicious program, to give itself the opportunity to remediate the . . .

 

Immunize from WannaCry Ransomware with Minerva Labs FREE Vaccinator

The WannaCry/WannaCrypt malware outbreak of May 12th presents a powerful opportunity to reflect upon the endpoint security architecture to understand the role of the various defense layers that . . .

 

Minerva’s FREE WannaCry Vaccinator

The WannaCry/WannaCrypt malware outbreak of May 12th presents a powerful opportunity to reflect upon the endpoint security architecture to understand the role of the various defense layers that . . .

 

3 Legitimate Looking Techniques Used to Avoid Ransomware Detection

Ransomware comes in many forms. One strategy commonly used in ransomware attacks is to cloak malicious actions within legitimate looking programs. This combination allows the ransomware to . . .

 

Stay Informed

Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.

Categories

see all