Minerva’s solution augments antivirus or EPP solutions without interfering or overlapping with their functionality.
PREVENTED! An active malware campaign using emails distributes RTF files that carry a widespread exploit. Patch at your own pace
All of Minerva customers are fully protected from this campaign as from many other Office vulnerabilities even if their systems were not patched yet – regardless of their Office Suite version and . . .
Read More >>Attackers Insert Themselves into the Email Conversation to Spread Malware
The “never get gifts from strangers” rule applies for suspicious email attachments as well as enterprises and SMBs alike educate their employees about the dangers lurking in cyberspace.
Read More >>How can malware authors determine whether their tools will be detected by antivirus solutions
Malware authors work rigorously to ensure their creations will go undetected by security defenses. Though some adversaries engage in their own hands-on testing, many of them turn to third-party . . .
Read More >>Deconstructing Fileless Attacks into 4 Underlying Techniques
How can we turn discussions about the vague notion of fileless attacks into constructive, specific conversations?
Read More >>How Fileless Malware Infections Start
The notion of fileless attacks describes incidents where adversaries avoid writing malicious code to disk, aiming to operate solely in memory and abuse features of applications and the OS.
Read More >>Minerva’s Anti-Evasion Platform as Part of the McAfee Ecosystem
What drives two endpoint security vendors to work together? The recognition that customers will benefit from the unique advantages of each company’s technologies.
Read More >>How Minerva’s Anti-Evasion Platform Fits into Your Incident Response Process
Investigating a suspicious security event on the endpoint and responding to a possible infection can be stressful and time-consuming. Was it a false alarm? Did the threat succeed at penetrating . . .
Read More >>CoffeeShot: Avoid Detection with Memory Injection
CoffeeShot is an evasion framework that injects payload from Java-based programs into designated processes on Microsoft Windows.
Read More >>Windows Defender in the Enterprise: An EPP Product in the Making
Microsoft’s built-in and commercial technologies offer an EPP-like solution that can be attractive for organizations but can also create confusion and overlapping of features.
Read More >>Untangling the “Windows Defender” Naming Mess
Microsoft includes “Windows Defender” in names of several security capabilities that the company provides. In discussions with Minerva Labs customers and partners I’ve witnessed frequent confusion . . .
Read More >>Pimped Buhtrap Source Leaked
Following the leak of an enhanced Buhtrap malware source code, Minerva’s research team released a summary of its highlights, sharing their insights about this threat and the aftermath of the leak.
Read More >>