<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Why Some Security Products Are Affected by Meltdown & Spectre Patches and Others Aren’t

When deploying software on endpoints, enterprises need to understand the risks a product might pose to the stability of the system. 

Read More >>
 

The Emotet Grinch Is Back – with Triple PowerShell Gift Wrap

If you read our earlier post you are already familiar with Emotet. Recently Minerva prevented a new wave of Emotet attacks, a special Christmas-themed Emotet campaign - “Emotet Grinch”.

Read More >>
 

4 Malware Trends That Will Dominate 2018

End of the year is a great opportunity to reflect upon the key trends that have shaped 2017 and set the direction for the upcoming year. Minerva Labs undertook extensive research into malware

Read More >>
 

Emotet Goes More Evasive. Here’s a DIY Vaccine to Prevent It

Emotet is a banking Trojan, designed for stealing banking information, email accounts and automatically siphoning money from victims’ bank accounts. It is known to be leveraging victims’ contact

Read More >>
 

Prevented by Minerva Labs - New Evasive Malware Technique exploits Microsoft Dynamic Exchange

An increasing number of attacks take advantage of the capabilities of modern document formats to get past baseline anti-malware solutions. Such evasive measures involve initiating malicious

Read More >>
 

Reflections Upon Deception-Based Security Tactics

I’ve been pondering the use of deception and variability to defend IT assets. Honeypots have been discussed in this context for quite a while, yet their initial implementation failed to take off

Read More >>
 

Minerva Discovers WaterMiner - Key Highlights

Minerva Labs has recently discovered a new cryptocurrency mining campaign that uses evasion techniques to avoid being detected. In the campaign dubbed “WaterMiner”, malicious code was delivered to

Read More >>
 

WaterMiner – a New Evasive Crypto-Miner

Minerva Labs has uncovered malicious software that implements a new evasive cryptocurrency mining campaign.

Read More >>
 

Prevention and Detection - Two Sides of the Same Coin

In our recent paper, “Making sense of the endpoint security” we compared and contrasted different types of endpoint security tools, from endpoint control, to anti-malware, to endpoint detection

Read More >>
 

Making Sense of Endpoint Security

Despite worldwide spending reaching billions of dollars on endpoint security, in too many organizations endpoints are still the most vulnerable part of an organization’s technology infrastructure.

Read More >>
 

Subscribe to Our Blog