Recently as COVID-19 spreads, more organizations are enforcing remote work-from-home, making employees home computers more vulnerable than ever to cyberattacks.
Minerva is the only vendor that . . .
Recently as COVID-19 spreads, more organizations are enforcing remote work-from-home, making employees home computers more vulnerable than ever to cyberattacks.
Minerva is the only vendor that . . .
Read More >>Minerva’s solution augments antivirus or EPP solutions without interfering or overlapping with their functionality.
Read More >>All business organizations protected by MINERVA are safe! No infection or data loss accrued thanks to Minerva’s Double Layered Ransomware Protection. According to the media, this is a new type of . . .
Read More >>To all of our customers, OEM and MSP/MSSP partners,
Read More >>All of Minerva customers are fully protected from this campaign as from many other Office vulnerabilities even if their systems were not patched yet – regardless of their Office Suite version and . . .
Read More >>The “never get gifts from strangers” rule applies for suspicious email attachments as well as enterprises and SMBs alike educate their employees about the dangers lurking in cyberspace.
Read More >>In the context of cybersecurity, evasion is the practice of executing malicious code despite the presence of anti-malware controls. Such tactics don’t exploit fixable defects. Instead, they take . . .
Read More >>AZORult attackers continue to adjust tactics to increase the chances that they’ll evade detection. This malware is a common information stealer, capable of exfiltrating a wide range of sensitive . . .
Read More >>“Cryptojacking” campaigns misuse victims’ computational resources for mining illicit cryptocurrency profits. Below we present our forecast about malicious cryptominers in the upcoming year and . . .
Read More >>Malicious actors are consistently and persistently looking for new avenues to compromise sensitive data and they’ve found one such entry through legal firms.
Read More >>Malware authors work rigorously to ensure their creations will go undetected by security defenses. Though some adversaries engage in their own hands-on testing, many of them turn to third-party . . .
Read More >>How can we turn discussions about the vague notion of fileless attacks into constructive, specific conversations?
Read More >>Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.