Minerva Labs
Follow
26 Followers
Follow Minerva Labs on their other social channels!
About Us
Founded:
2014
Company Size:
11-50 employees
Company Type:
Private
Location:
Israel
Website:
Minerva Labs is an innovative endpoint security solution provider that protects enterprises from today's stealthiest attacks without the need to detect threats first, all before any damage has been done. Minerva's Anti-Evasion Platform blocks threats that bypass antivirus and other baseline ...
Read more
Promoted Content
WEBINAR: Safeguarding Endpoints with Vaccination: What It Is and Why You Should Care
Follow
Exploit Kits? PREVENTED by Minerva!
An exploit kit (EK) is a software product sold on the underground market, designed to run on top of web servers in order to spread malware to victims browsing to infected websites. EKs first try to detect vulnerabilities in the victim's browser or its plugins, and then try to execute an exploit against the specific detected product configuration.
Follow
UIWIX – Evasive Ransomware Exploiting ETERNALBLUE
How the UIWIX ransomware uses evasion techniques to bypass existing security defenses to target endpoints.
Follow
3 Legitimate Looking Techniques Used to Avoid Ransomware Detection
A common strategy used in ransomware attacks is to cloak malicious actions within legitimate looking programs. This combination allows the ransomware to bypass existing security defenses and avoid detection.
Follow
Minerva vs. Ransomware – Remediating Ransomware Damage
Ransomware are an awful damaging threat to every enterprise. Therefore we developed a unique patent pending, new method for remediating damage done by ransomware, such as Cryptolocker, Cryptowall, CTB-Locker, Teslacrypt, Valutcrypt etc.
Follow
Duuzer – A Threat Prevented
Duuzer is a backdoor detected by Symantec’s researchers, targeting mostly the manufacturing industry in South Korea.
Follow
Bedep – Preventing Fileless Malware
Fileless malware is a rapidly rising trend that Kaspersky Labs highlighted in their predictions for 2016. Bedep belongs this class of malware, as it runs within the browser process and leaves practically no traces of its activity, making its detection and analysis a real challenge.
Follow
The Attack on the DNC – How it Could Have Been Prevented
Six weeks ago both Palo Alto Networks and CrowdStrike released reports regarding a highly advanced attack by a group dubbed APT28, Sofacy or COZY BEAR, linked to an unknown Russian intelligence agency. This was the same malware that hit the DNC. Minerva stops this malware variant without any prior knowledge whatsoever!
Follow
Ransomware is Here to Stay, but…
Since 2012 ransomware has been an ever-growing threat. It inflicts catastrophic damage to endpoints, making it one of the most familiar types of computer threats and is well-recognized even by non-techies.
Follow
Incident response teams spend tremendous time and effort trying to contain attacks. What if you could contain attacks automatically and even prevent outbreaks before they have penetrated your organization, wouldn’t you want to know how? Join us for an educational webinar with Lenny Zeltser, Sep 27, 1pm EST. Register today http://bit.ly/2xtx0dp
Follow
With half of US businesses not carrying cyber insurance due to mistrust about pricing (despite largely knowing breaches are only going to increase within the next year), it’s time to consider whether insurance should start to be legislated. http://bit.ly/2sHxtTq 

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Cybrary On The Go

Get the Cybrary app for Android for online and offline viewing of our lessons.

Get it on Google Play
 

Support Cybrary

Donate Here to Get This Month's Donor Badge

 
Skip to toolbar

We recommend always using caution when following any link

Are you sure you want to continue?

Continue
Cancel