At Minerva we are proud of our products and believe in their ability to put malware to bed. That’s why we were happy to hear that we scored high marks in a recently published research paper that . . .
Browser Isolation - The Next Generation of Secure Browsing
Browser based attacks are one of the most common vectors used by adversaries to gain control of an internal system on a target network. In this "beachhead assault" stage of a cyber attack campaign, . . .
Read More >>MSPs really need to start looking into Ransomware Protection
When it comes to ransomware protection, Managed Service Providers (MSPs) are in a unique position. On the one hand, they are often the main line of defense for their customers against ransomware. At . . .
Read More >>Stopping BuerLoader With Minerva Lab's Hostile Environment Simulation module
BuerLoader is a stealthy implant, which is frequently used by attackers as an initial foothold in organizations. The malware’s common method of infection is by phishing mails, which contain a google . . .
Read More >>Minerva’s Anti-Evasion Platform Working with Windows Defender Antivirus
Minerva’s solution augments antivirus or EPP solutions without interfering or overlapping with their functionality.
Read More >>PREVENTED! An active malware campaign using emails distributes RTF files that carry a widespread exploit. Patch at your own pace
All of Minerva customers are fully protected from this campaign as from many other Office vulnerabilities even if their systems were not patched yet – regardless of their Office Suite version and . . .
Read More >>Attackers Insert Themselves into the Email Conversation to Spread Malware
The “never get gifts from strangers” rule applies for suspicious email attachments as well as enterprises and SMBs alike educate their employees about the dangers lurking in cyberspace.
Read More >>Legally Dangerous Attackers
Malicious actors are consistently and persistently looking for new avenues to compromise sensitive data and they’ve found one such entry through legal firms.
Read More >>How can malware authors determine whether their tools will be detected by antivirus solutions
Malware authors work rigorously to ensure their creations will go undetected by security defenses. Though some adversaries engage in their own hands-on testing, many of them turn to third-party . . .
Read More >>Deconstructing Fileless Attacks into 4 Underlying Techniques
How can we turn discussions about the vague notion of fileless attacks into constructive, specific conversations?
Read More >>How Fileless Malware Infections Start
The notion of fileless attacks describes incidents where adversaries avoid writing malicious code to disk, aiming to operate solely in memory and abuse features of applications and the OS.
Read More >>Minerva’s Anti-Evasion Platform as Part of the McAfee Ecosystem
What drives two endpoint security vendors to work together? The recognition that customers will benefit from the unique advantages of each company’s technologies.
Read More >>