<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Mimicry: The Evolution of Deceptive Defenses and Attacks

Many aspects of cyber-attacks resemble time-tested techniques found in nature. Self-propagating malware is reminiscent of biological viruses spreading from one organism to another, or malicious

Read More >>
 

The Upsurge in Evasive Malware

At this point in our industry’s history, pretty much every IT professional is very aware of the need for a security strategy that not only protects against current threats, but one that’s also

Read More >>
 

Protecting ATMs Against Jackpotting Attacks

Jackpotting attacks against ATMs are highly profitable, and often involve both logical and physical attack vectors. How can banks and ATM manufacturers safeguard their systems against such

Read More >>
 

Considerations for Augmenting Antivirus Protection on the Endpoint

When deciding how to augment your baseline AV protection on the endpoint, understand the benefits and operational characteristics of each approach you’re considering. Here are a few guidelines.

Read More >>
 

Why Your Security Solution Isn’t Catching Evasive Malware

You’re already keenly aware of the malware threat to your organization – this nasty vehicle by which ransomware, external attacks, and data breaches enter in has become so rampant, you have layers

Read More >>
 

Prevented by Minerva Labs - New Evasive Malware Technique exploits Microsoft Dynamic Exchange

An increasing number of attacks take advantage of the capabilities of modern document formats to get past baseline anti-malware solutions. Such evasive measures involve initiating malicious

Read More >>
 
1