<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=179060&amp;fmt=gif">

Minerva Labs Blog

Pimped Buhtrap Source Leaked

Following the leak of an enhanced Buhtrap malware source code, Minerva’s research team released a summary of its highlights, sharing their insights about this threat and the aftermath of the leak.

Read More >>
 

Containing and Recovering from Incidents with the Help of Minerva Labs and Carbon Black

Despite their efforts to prevent intrusions, enterprises can find themselves dealing with large-scale compromises. When the investigation reveals that numerous endpoints in the organizations are

Read More >>
 

MSPs: Defining Your Security Services Commitments

If you’re thinking of adding on a security services offering to your practice or already have such a solution, confirm that your customers know what to expect from your security service.

Read More >>
 

MSPs – 3 Steps to Making Security Profitable and Valuable

If you’re like most MSPs, you’re always looking to increase either the scope of current services within a given customer or are looking to expand your service offerings.

Read More >>
 

GhostMiner: Cryptomining Malware Goes Fileless

Cybercriminals are increasingly relying on malicious cryptominers as a way of making money online, often shifting from using ransomware or diversifying revenue streams.

Read More >>
 

Why are Municipalities and Governmental Services a Prime Target for Cybercriminals?

Threats to state and local governments can be prevented before having to pay a fortune in remediation costs. Learn why municipalities and governmental services are a prime target for

Read More >>
 

UIWIX – Evasive Ransomware Exploiting ETERNALBLUE

Last week everybody talked about the WannaCry ransomware, a non-evasive ransomware which exploited vulnerable servers to propagate, successfully infecting anything from digital billboards to the

Read More >>
 

Minerva’s FREE WannaCry Vaccinator

The WannaCry/WannaCrypt malware outbreak of May 12th presents a powerful opportunity to reflect upon the endpoint security architecture to understand the role of the various defense layers that

Read More >>
 

3 Legitimate Looking Techniques Used to Avoid Ransomware Detection

Ransomware comes in many forms. One strategy commonly used in ransomware attacks is to cloak malicious actions within legitimate looking programs. This combination allows the ransomware to

Read More >>
 

Vaccinating Against Spora Ransomware: A Proof-of-Concept Tool by Minerva Labs

Spora is presently among the most common ransomware families. For instance, it struck countless victims in the fake “Chrome Font Pack Update” campaign, encrypting victims’ files even without

Read More >>
 
1 2

Subscribe to Our Blog