<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

A Historical Take on the Evolution of Endpoint Security

What makes endpoints the gateway into enterprises for so many cyber-attacks? Reviewing key events from the history of endpoint security helps shed some light on what drives attackers to target

Read More >>
 

What is an exploit kit?

In our 2017 End of Year Research Report, we found that 86% of exploit kits employed evasive tactics to avoid detection. Here’s all you need to know about exploit kits and how to address the threat.

Read More >>
 

Confronting Snake Oil Sales Tactics in Endpoint Security

How can you validate the efficacy claims of endpoint security vendors? Here's a free tool to help you out.

Read More >>
 

How to Protect Against Fileless Malware Attacks

Fileless malware is surging. Can your existing endpoint solutions handle their evasive nature?

Read More >>
 

GhostMiner: Cryptomining Malware Goes Fileless

Cybercriminals are increasingly relying on malicious cryptominers as a way of making money online, often shifting from using ransomware or diversifying revenue streams.

Read More >>
 

The Emotet Grinch Is Back – with Triple PowerShell Gift Wrap

If you read our earlier post you are already familiar with Emotet. Recently Minerva prevented a new wave of Emotet attacks, a special Christmas-themed Emotet campaign - “Emotet Grinch”.

Read More >>
 
1

Subscribe to Our Blog