<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Malware Evasion Techniques - Sandbox Evasion

Modern malware doesn't break out and wreak havoc the moment it lands in your network. Instead, upon establishing a beachhead, it usually implements a series of evasive techniques in order to remain . . .

 

MSPs really need to start looking into Ransomware Protection

When it comes to ransomware protection, Managed Service Providers (MSPs) are in a unique position. On the one hand, they are often the main line of defense for their customers against ransomware. At . . .

 

U.S. Government Warns Against Paying Ransomware Attackers

Ransomware attacks have become so common, it seems we hear about new and worse ones almost on a daily basis. So much so that the U.S. government is directly addressing the issue with a pair of new . . .

 

Exterminating A Parallax RAT

Over the last couple of years, the use of user mode API hooking by security vendors became highly popular. Most next-gen antiviruses and EDRs use hooking for detecting and preventing malicious . . .

 

A New Paradigm in Endpoint Security, Precipitated by COVID-19

Let’s talk endpoint security in the age when the corporate security perimeter not only dissolved into the cloud, but also engulfed employees’ home PCs and networks. Enterprises have been cautiously . . .

 

Sedating The Kraken – Blocking APT32 Fileless Injection

Malwarebytes’s Threat Intelligence team has uncovered a new attack dubbed “Kraken”, which is attributed to APT32.

 

Minerva’s Anti-Evasion Platform Working with Windows Defender Antivirus

Minerva’s solution augments antivirus or EPP solutions without interfering or overlapping with their functionality.

 

PREVENTED! An active malware campaign using emails distributes RTF files that carry a widespread exploit. Patch at your own pace

All of Minerva customers are fully protected from this campaign as from many other Office vulnerabilities even if their systems were not patched yet – regardless of their Office Suite version and . . .

 

Attackers Insert Themselves into the Email Conversation to Spread Malware

The “never get gifts from strangers” rule applies for suspicious email attachments as well as enterprises and SMBs alike educate their employees about the dangers lurking in cyberspace.

 

How can malware authors determine whether their tools will be detected by antivirus solutions

Malware authors work rigorously to ensure their creations will go undetected by security defenses. Though some adversaries engage in their own hands-on testing, many of them turn to third-party . . .

 

Deconstructing Fileless Attacks into 4 Underlying Techniques

How can we turn discussions about the vague notion of fileless attacks into constructive, specific conversations?

 

How Fileless Malware Infections Start

The notion of fileless attacks describes incidents where adversaries avoid writing malicious code to disk, aiming to operate solely in memory and abuse features of applications and the OS.

 
1 2 3

Stay Informed

Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.

Categories

see all