McAfee Labs

Read McAfee Labs blogs for the latest threat research, threat intelligence, and thought leadership from the Threat Research team.

Distinctive Campaign Evolution of Pikabot Malware
Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early...
Android Phishing Scam Using Malware-as-a-Service on the Rise in India
Authored by ZePeng Chen and Wenfeng Yu  McAfee Mobile Research Team has observed an active scam malware...
Rise in Deceptive PDF: The Gateway to Malicious Payloads
Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the...
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files
Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires...
MoqHao evolution: New variants start automatically right after installation
Authored by Dexter Shin  MoqHao is a well-known Android malware family associated with the Roaming Mantis threat...
Generative AI: Cross the Stream Where it is Shallowest
The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles,...
From Email to RAT: Deciphering a VB Script-Driven Campaign
Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized...
Stealth Backdoor “Android/Xamalicious” Actively Infecting Devices
Authored by Fernando Ruiz  McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source...
Shielding Against Android Phishing in Indian Banking
Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through...
PDF Phishing: Beyond the Bait
By Lakshya Mathur & Yashvi Shah  Phishing attackers aim to deceive individuals into revealing sensitive information for...
Beneath the Surface: How Hackers Turn NetSupport Against Users
NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical...
Fake Android and iOS apps steal SMS and contacts in South Korea
Authored by Dexter Shin Most people have smartphones these days which can be used to easily search...
1 - 12 of 674
Back to top