<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

MSPs: Defining Your Security Services Commitments

If you’re thinking of adding on a security services offering to your practice or already have such a solution, confirm that your customers know what to expect from your security service.


MSPs – 3 Steps to Making Security Profitable and Valuable

If you’re like most MSPs, you’re always looking to increase either the scope of current services within a given customer or are looking to expand your service offerings.


GhostMiner: Cryptomining Malware Goes Fileless

Cybercriminals are increasingly relying on malicious cryptominers as a way of making money online, often shifting from using ransomware or diversifying revenue streams.


Endpoint Vaccination: Your IR Teams will Thank You

Contain the next malware outbreak and learn how endpoint vaccination works magic in your incident response.


Why are Municipalities and Governmental Services a Prime Target for Cybercriminals?

Threats to state and local governments can be prevented before having to pay a fortune in remediation costs. Learn why municipalities and governmental services are a prime target for . . .


Mimicry: The Evolution of Deceptive Defenses and Attacks

Many aspects of cyber-attacks resemble time-tested techniques found in nature. Self-propagating malware is reminiscent of biological viruses spreading from one organism to another, or malicious . . .


The Upsurge in Evasive Malware

At this point in our industry’s history, pretty much every IT professional is very aware of the need for a security strategy that not only protects against current threats, but one that’s also . . .


Protecting ATMs Against Jackpotting Attacks

Jackpotting attacks against ATMs are highly profitable, and often involve both logical and physical attack vectors. How can banks and ATM manufacturers safeguard their systems against such . . .


Considerations for Augmenting Antivirus Protection on the Endpoint

When deciding how to augment your baseline AV protection on the endpoint, understand the benefits and operational characteristics of each approach you’re considering. Here are a few guidelines.


Evasive Malware: Learning by Example

Malware authors are evolving as quickly as the AV and security vendors are. Here are some examples of how evasive techniques were implemented in attacks that hit the headlines.


Why Your Security Solution Isn’t Catching Evasive Malware

You’re already keenly aware of the malware threat to your organization – this nasty vehicle by which ransomware, external attacks, and data breaches enter in has become so rampant, you have layers . . .


Why Some Security Products Are Affected by Meltdown & Spectre Patches and Others Aren’t

When deploying software on endpoints, enterprises need to understand the risks a product might pose to the stability of the system. 


Stay Informed

Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.


see all