<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Pimped Buhtrap Source Leaked

Following the leak of an enhanced Buhtrap malware source code, Minerva’s research team released a summary of its highlights, sharing their insights about this threat and the aftermath of the leak.

Read More >>
 

Containing and Recovering from Incidents with the Help of Minerva Labs and Carbon Black

Despite their efforts to prevent intrusions, enterprises can find themselves dealing with large-scale compromises. When the investigation reveals that numerous endpoints in the organizations are

Read More >>
 

A Historical Take on the Evolution of Endpoint Security

What makes endpoints the gateway into enterprises for so many cyber-attacks? Reviewing key events from the history of endpoint security helps shed some light on what drives attackers to target

Read More >>
 

What is an exploit kit?

In our 2017 End of Year Research Report, we found that 86% of exploit kits employed evasive tactics to avoid detection. Here’s all you need to know about exploit kits and how to address the threat.

Read More >>
 

Confronting Snake Oil Sales Tactics in Endpoint Security

How can you validate the efficacy claims of endpoint security vendors? Here's a free tool to help you out.

Read More >>
 

Why “Next-Gen AV” is just “AV”

In the world of antivirus the idea of “next-gen” AV is confusing at best. But is it ready to take on the challenge of ‘next-gen’ threats?

Read More >>
 

Protecting ATMs Against Jackpotting Attacks

Jackpotting attacks against ATMs are highly profitable, and often involve both logical and physical attack vectors. How can banks and ATM manufacturers safeguard their systems against such

Read More >>
 

Considerations for Augmenting Antivirus Protection on the Endpoint

When deciding how to augment your baseline AV protection on the endpoint, understand the benefits and operational characteristics of each approach you’re considering. Here are a few guidelines.

Read More >>
 

Evasive Malware: Learning by Example

Malware authors are evolving as quickly as the AV and security vendors are. Here are some examples of how evasive techniques were implemented in attacks that hit the headlines.

Read More >>
 

Why Your Security Solution Isn’t Catching Evasive Malware

You’re already keenly aware of the malware threat to your organization – this nasty vehicle by which ransomware, external attacks, and data breaches enter in has become so rampant, you have layers

Read More >>
 
1 2 3

Subscribe to Our Blog

Topics

see all