<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

MSPs – 3 Steps to Making Security Profitable and Valuable

If you’re like most MSPs, you’re always looking to increase either the scope of current services within a given customer or are looking to expand your service offerings.

Read More >>
 

GhostMiner: Cryptomining Malware Goes Fileless

Cybercriminals are increasingly relying on malicious cryptominers as a way of making money online, often shifting from using ransomware or diversifying revenue streams.

Read More >>
 

Endpoint Vaccination: Your IR Teams will Thank You

Contain the next malware outbreak and learn how endpoint vaccination works magic in your incident response.

Read More >>
 

Why are Municipalities and Governmental Services a Prime Target for Cybercriminals?

Threats to state and local governments can be prevented before having to pay a fortune in remediation costs. Learn why municipalities and governmental services are a prime target for

Read More >>
 

Mimicry: The Evolution of Deceptive Defenses and Attacks

Many aspects of cyber-attacks resemble time-tested techniques found in nature. Self-propagating malware is reminiscent of biological viruses spreading from one organism to another, or malicious

Read More >>
 

The Upsurge in Evasive Malware

At this point in our industry’s history, pretty much every IT professional is very aware of the need for a security strategy that not only protects against current threats, but one that’s also

Read More >>
 

Protecting ATMs Against Jackpotting Attacks

Jackpotting attacks against ATMs are highly profitable, and often involve both logical and physical attack vectors. How can banks and ATM manufacturers safeguard their systems against such

Read More >>
 

Considerations for Augmenting Antivirus Protection on the Endpoint

When deciding how to augment your baseline AV protection on the endpoint, understand the benefits and operational characteristics of each approach you’re considering. Here are a few guidelines.

Read More >>
 

Evasive Malware: Learning by Example

Malware authors are evolving as quickly as the AV and security vendors are. Here are some examples of how evasive techniques were implemented in attacks that hit the headlines.

Read More >>
 

Why Your Security Solution Isn’t Catching Evasive Malware

You’re already keenly aware of the malware threat to your organization – this nasty vehicle by which ransomware, external attacks, and data breaches enter in has become so rampant, you have layers

Read More >>
 
1 2 3 4 5

Subscribe to Our Blog