McAfee Labs

Read McAfee Labs blogs for the latest threat research, threat intelligence, and thought leadership from the Threat Research team.

CryptoWall V3 and V4 Protection for McAfee Customers
Updated, November 6:  Since October 30, the release date of the Cyber Threat Alliance report on CryptoWall...
Ransomware: an Insight to Financial Gain
The Cyber Threat Alliance examines the financial gains of a popular malware in "Lucrative Ransomware Attacks: Analysis of the CryptoWall...
Hidden Data Economy Report Exposes Price Points for Stolen Data
The Hidden Data Economy report from McAfee Labs provides examples of how stolen data is being packaged and sold.
We’ve Been Hacked! Okay, I’ll Deal With It Next Week
That was the message I got from a CEO when we presented evidence that their organization had...
Japanese Banking Trojan Shifu Combines Malware Tools
A new banking Trojan combines elements of multiple malware tools. Shifu has circulated since April, and attacks primarily Japanese banks.
Best practices for preventing Dridex infections
Mitigating the Dridex threat at multiple levels like file, registry, url and ip address can be achieved at...
AshleyMadison Hack Demonstrates Power of Scam Artists
This blog post was written by Armando Rodriguez. Last month, cybersecurity journalist Brian Krebs broke the news...
Ease of Buying Ransomware Fuels Affiliate Program
Ransomware's success is fueled by the ease of getting ransomware and how how well the affiliate program works.
Threat Actors Use Encrypted Office Binary Format to Evade Detection
Attacks leveraging the Sandworm vulnerability now include some interesting detection-evasion techniques, specifically an old format and encryption.
‘Evoltin’ POS Malware Attacks via Macro
Recently McAfee labs found a point-of-sale malware that spreads through malicious macros inside a doc file. This threat arrives via...
McAfee Labs Threats Report Highlights Ransomware, Flash Exploits, Firmware Attacks Surge
The McAfee Labs Threats Report describes a surge in ransomware, new Adobe Flash exploits, and attacks that reprogram hard disk...
When Hackers Get Hacked: the Malware Servers of a Data-Stealing Campaign
Selling stolen data is an easy way for cybercriminals to make money. One typical campaign makes a two-way connection between...
493 - 504 of 692
Back to top