McAfee Labs

Read McAfee Labs blogs for the latest threat research, threat intelligence, and thought leadership from the Threat Research team.

Redline Stealer: A Novel Approach
Authored by Mohansundaram M and Neil Tyagi A new packed variant of the Redline Stealer trojan was...
Distinctive Campaign Evolution of Pikabot Malware
Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early...
Android Phishing Scam Using Malware-as-a-Service on the Rise in India
Authored by ZePeng Chen and Wenfeng Yu  McAfee Mobile Research Team has observed an active scam malware...
Rise in Deceptive PDF: The Gateway to Malicious Payloads
Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the...
GUloader Unmasked: Decrypting the Threat of Malicious SVG Files
Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires...
MoqHao evolution: New variants start automatically right after installation
Authored by Dexter Shin  MoqHao is a well-known Android malware family associated with the Roaming Mantis threat...
Generative AI: Cross the Stream Where it is Shallowest
The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles,...
From Email to RAT: Deciphering a VB Script-Driven Campaign
Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized...
Stealth Backdoor “Android/Xamalicious” Actively Infecting Devices
Authored by Fernando Ruiz  McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source...
Shielding Against Android Phishing in Indian Banking
Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through...
PDF Phishing: Beyond the Bait
By Lakshya Mathur & Yashvi Shah  Phishing attackers aim to deceive individuals into revealing sensitive information for...
Beneath the Surface: How Hackers Turn NetSupport Against Users
NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical...
25 - 36 of 692
Back to top