McAfee Labs 是威胁研究、威胁情报和网络安全思想领导的全球领先来源。McAfee Labs 团队的 500 名威胁研究人员将从主要威胁媒介（文件、Web、邮件和网络）中数百万传感器收集的真实数据互相关联，并实时提供威胁情报，以便加强保护并降低风险。
This in-depth report discusses the polymorphic worm W/32Worm-AAEH, the control infrastructure behind it, and what it took to take it down.
McAfee Labs’ quarterly analysis of key threat topics and trends.
This in-depth report examines social engineering as an attack vector. It details the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
This executive summary provides an overview of social engineering as an attack vector. It lists the psychological levers employed by social engineers to influence victims, communication channels used for attacks, and controls businesses should establish to reduce risk.
McAfee Labs’ quarterly analysis of global email and web threats.
The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free. […]
Lately, McAfee Labs has observed a lot of active samples detected as Trojan Laziok by many security vendors. According to online reports, the Trojan Laziok is dropped via an exploit of the Microsoft Windows Common Controls ActiveX Control Remote Code Execution Vulnerability (CVE-2012-0158), which arrives via a spam email. In contrast, we have identified the […]
The post Kraken/Laziok HTTP Bot Controls Victims With Remote Admin Tool appeared first on McAfee.
In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]