<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Ancient Chinese Wisdom vs. Cryptojacking

“Cryptojacking” campaigns misuse victims’ computational resources for mining illicit cryptocurrency profits. Below we present our forecast about malicious cryptominers in the upcoming year and . . .

 

Legally Dangerous Attackers

Malicious actors are consistently and persistently looking for new avenues to compromise sensitive data and they’ve found one such entry through legal firms.

 

How can malware authors determine whether their tools will be detected by antivirus solutions

Malware authors work rigorously to ensure their creations will go undetected by security defenses. Though some adversaries engage in their own hands-on testing, many of them turn to third-party . . .

 

Deconstructing Fileless Attacks into 4 Underlying Techniques

How can we turn discussions about the vague notion of fileless attacks into constructive, specific conversations?

 

How Fileless Malware Infections Start

The notion of fileless attacks describes incidents where adversaries avoid writing malicious code to disk, aiming to operate solely in memory and abuse features of applications and the OS.

 

Minerva’s Anti-Evasion Platform as Part of the McAfee Ecosystem

What drives two endpoint security vendors to work together? The recognition that customers will benefit from the unique advantages of each company’s technologies.

 

How Minerva’s Anti-Evasion Platform Fits into Your Incident Response Process

Investigating a suspicious security event on the endpoint and responding to a possible infection can be stressful and time-consuming. Was it a false alarm? Did the threat succeed at penetrating . . .

 

CoffeeShot: Avoid Detection with Memory Injection

CoffeeShot is an evasion framework that injects payload from Java-based programs into designated processes on Microsoft Windows.

 

Windows Defender in the Enterprise: An EPP Product in the Making

Microsoft’s built-in and commercial technologies offer an EPP-like solution that can be attractive for organizations but can also create confusion and overlapping of features. 

 

Untangling the “Windows Defender” Naming Mess

Microsoft includes “Windows Defender” in names of several security capabilities that the company provides. In discussions with Minerva Labs customers and partners I’ve witnessed frequent confusion . . .

 

Pimped Buhtrap Source Leaked

Following the leak of an enhanced Buhtrap malware source code, Minerva’s research team released a summary of its highlights, sharing their insights about this threat and the aftermath of the leak.

 

Containing and Recovering from Incidents with the Help of Minerva Labs and Carbon Black

Despite their efforts to prevent intrusions, enterprises can find themselves dealing with large-scale compromises. When the investigation reveals that numerous endpoints in the organizations are . . .

 

Stay Informed

Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.

Categories

see all