The Minerva Labs Research team has recently encountered a resurgence in Rig exploit kit. This infamous exploit kit has been reportedly used by threat actors since 2015 (as reported by Trustwave). . . .
How can we turn discussions about the vague notion of fileless attacks into constructive, specific conversations?
The notion of fileless attacks describes incidents where adversaries avoid writing malicious code to disk, aiming to operate solely in memory and abuse features of applications and the OS.
What makes endpoints the gateway into enterprises for so many cyber-attacks? Reviewing key events from the history of endpoint security helps shed some light on what drives attackers to target . . .
In our 2017 End of Year Research Report, we found that 86% of exploit kits employed evasive tactics to avoid detection. Here’s all you need to know about exploit kits and how to address the threat.
Jackpotting attacks against ATMs are highly profitable, and often involve both logical and physical attack vectors. How can banks and ATM manufacturers safeguard their systems against such . . .
When deciding how to augment your baseline AV protection on the endpoint, understand the benefits and operational characteristics of each approach you’re considering. Here are a few guidelines.
An exploit kit (EK) is a software product sold on the underground market, designed to run on top of web servers in order to spread malware to victims browsing to infected websites.
Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.