As discussed in our previous blog posts, an exploit kit (EK) is a software product sold on the underground market, designed to run on top of web servers in order to spread malware to victims . . .
An exploit kit (EK) is a software product sold on the underground market, designed to run on top of web servers in order to spread malware to victims browsing to infected websites.
Minerva's Research team have been on the hunt for emerging threats. In recent months we have observed the use of new reconnaissance and cookie stealer malware. This type of activity might suggest . . .
At the moment, Ransomware is the hot button issue for information security professionals world wide.
Malware authors are aware of this, and know that each minute their ransomware remains . . .
In the last several weeks, the Locky malware sped its way around the world at an alarming rate, infecting hundreds of thousands of endpoints. This emerging threat "is spreading like the . . .
Yesterday Symantec Security Response reported about a new trojan named Ratopak which was used in targeted attacks against Russian banks.
Since 2012 ransomware has been an ever-growing threat. It inflicts catastrophic damage to endpoints, making it one of the most familiar types of computer threats and is well-recognized even by . . .
Recently The Ponemon Institute conducted an independent survey that was sponsored by Palo Alto networks. The purpose of the survey was to examine "the relationships between the time spent and . . .
The company was named “Most innovative Cyber Security Startup in Israel” and “Most Innovative Startup” within less than a week and on two separate continents.
Our coming out party began at the
Ransomware are an awful damaging threat to every enterprise, as we showed in previous blog post Minerva prevents execution of ransomware without the need for detection and before any damage is . . .
In the last couple of years, we have witnessed the rise of ransomware taking users’ and organizations’ valuable files hostage. An example for such ransomware are the notorious Cryptowall, . . .
Crypters are tools used by attackers to change the binary signature of a malware while keeping its original functionality intact. The main reason for using them is to evade detection. Last week . . .
Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.