<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Malware Vaccination for the Enterprise, Brought to You by Minerva

We can immunize computer systems against some infections by deploying vaccines that fool malware into believing the endpoint is already infected. This premise has been lingering in my mind


Ripping and Replacing AV - be careful what you wish for

For too long, antivirus vendors didn’t innovate fast enough, and more and more companies started to question the effectiveness of AV. Understandably, there are now several vendors out there


Prevent or Detect: The Battle Against Memory Injection

In any cyber attack, the longer an attacker can remain undetected, the more pervasive, intrusive, and destructive they can be. So, the search is constantly on for new ways to compromise and take


Preventing the Latest Fileless Attack Endpoint Detection Tools Could Not Stop

Throughout the history of combat and military engagement, there are plenty of stories how a smaller force was able to overcome a larger force through the use of trickery and deception.


The Drawbacks of Using Code Snippets from the Web

Being a software engineer nowadays isn’t what it used to be a couple of decades ago – a lot of questions have a solution or a code example available online. And while some of us may take code


New Petya Ransomware Attack PREVENTED by Minerva Labs

During the last 12 hours, a new ransomware campaign is causing mayhem in what appears to be a one of the most catastrophic and aggressive ransomware attacks ever seen.

The ransomware is


Adwind Malware and other Evasive Java RATs

Modern cyber-attacks against well-defended enterprises are not as simple as you may think. They are comprised of many components in charge of different tasks.  For example, if an attacker wishes


UIWIX – Evasive Ransomware Exploiting ETERNALBLUE

Last week everybody talked about the WannaCry ransomware, a non-evasive ransomware which exploited vulnerable servers to propagate, successfully infecting anything from digital billboards to the


Reflecting on the Endpoint Security Architecture in the Aftermath of WannaCry

The outbreak of WannaCry ransomware has caused enterprises to examine their approach to safeguarding endpoints. What controls could have dampened the worm’s propagation? What measures could


Using Vaccination to Stop Malware in Real-Life Scenarios

Caught in the middle of a malware outbreak without sufficient preventative mechanisms, how can the organization contain the malicious program, to give itself the opportunity to remediate the


Subscribe to Our Blog


see all