We are thrilled to announce that we have been acquired by @rapid7, a leader in cloud risk and threat detection. Read more in the press release:
rapid7.com/about/press-re…
The more evasive the malware, the easier it is for Minerva to stop it!
With ChatGPT being used to mutate and change #malware to make them more evasive, this just makes it easier for Minerva to stop them. We don't need to detect the #ransomware to stop it!
gizmodo.com/chatgpt-ai-pol…
We recently analyzed a new upgraded version of Remcos RAT that has been found in the wild. This is a powerful tool that grants comprehensive remote surveillance capabilities. Basically, a hacker’s dream.
minerva-labs.com/blog/new-versi…
We recently discovered a new #ransomware variant, which performs MSDTC service DLL Hijacking to silently execute its payload. We have named this ransomware #CatB, based on the contact email and performed an analysis on how it works.
minerva-labs.com/blog/new-catb-…#ransomwareprotection
Want to see How Minerva Armor's #RansomwareProtection stops attacks before they even start?
You can now see Minerva Armor in action through either a pre-recorded demo or easily schedule a live tailored demonstration
Just visit here: minerva-labs.com/demo-request/?…
Windows Services are the OS mechanism used to initiate processes at system startup. We recently discovered a #vulnerability in this mechanism that could make it very easy for threat actors to penetrate and initiate a #ransomware attack.
minerva-labs.com/blog/windows-s…
We recently discovered a new and updated version of the malware load IceXLoader and took a deep dive into how it works. The C&C was still active and we were surprised by the number of victims we found in their database.
minerva-labs.com/blog/new-updat…
Chrome recently announced that they're going to stop supporting Windows 7 and 8.1
We show how you can you still keep your legacy endpoints secure even without the luxury of ongoing patches and updates.
minerva-labs.com/blog/how-you-c…
MSPs and their customers are focusing more than ever to ransomware today and the risk they pose to businesses. Find out how MSPs can play a significant role in safeguarding user from #ransomware with Minerva
Armor's #Ransomwareprevention platform.
loom.ly/EuzKb_g
Continuing our series on evasion techniques, take a look at how ransomware can evade your AV or EDR/XDR through memory injection, otherwise known as process injection
minerva-labs.com/blog/malware-e…
As promised, we've released a full walkthrough to our first ever Evasive CTF.
github.com/MinervaLabsRes…
If you got stuck along the way, or even if you missed it, it's a great opportunity to learn about how threat actors use evasive techniques to bypass security solutions.
@haroonmeer@NotMedic@HackingLZ@subTee@Bandrel@ThinkstCanary Indeed our hostile environment simulation changes how malware sees its environment, like you said causing it to nope out. If you ever want, we'd be more than happy to show it in action.
Following up on our previous post, we just release our findings on exactly what we think is going on with Acrobat Reader querying for security products
blog.minerva-labs.com/does-acrobat-r…