<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Investigating Resurgent Purple Fox

Purple fox is a veteran malware-as-a-service campaign, which until recently, infected devices through its exploit kit capabilities, spreading through vulnerable Microsoft Internet Explorer . . .

 

Rig Exploit Kit Resurges  - Minerva Prevents The Attack

The Minerva Labs Research team has recently encountered a resurgence in Rig exploit kit. This infamous exploit kit has been reportedly used by threat actors since 2015 (as reported by Trustwave). . . .

 

Deconstructing Fileless Attacks into 4 Underlying Techniques

How can we turn discussions about the vague notion of fileless attacks into constructive, specific conversations?

 

How Fileless Malware Infections Start

The notion of fileless attacks describes incidents where adversaries avoid writing malicious code to disk, aiming to operate solely in memory and abuse features of applications and the OS.

 

A Historical Take on the Evolution of Endpoint Security

What makes endpoints the gateway into enterprises for so many cyber-attacks? Reviewing key events from the history of endpoint security helps shed some light on what drives attackers to target . . .

 

What is an exploit kit?

In our 2017 End of Year Research Report, we found that 86% of exploit kits employed evasive tactics to avoid detection. Here’s all you need to know about exploit kits and how to address the threat.

 

Protecting ATMs Against Jackpotting Attacks

Jackpotting attacks against ATMs are highly profitable, and often involve both logical and physical attack vectors. How can banks and ATM manufacturers safeguard their systems against such . . .

 

Considerations for Augmenting Antivirus Protection on the Endpoint

When deciding how to augment your baseline AV protection on the endpoint, understand the benefits and operational characteristics of each approach you’re considering. Here are a few guidelines.

 

Malware Exploit Kits? PREVENTED by Minerva Labs

An exploit kit (EK) is a software product sold on the underground market, designed to run on top of web servers in order to spread malware to victims browsing to infected websites.

 
1

Stay Informed

Sign up for the Minerva newsletter and stay on top of the latest cybersecurity news.

Categories

see all