Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Rise in Deceptive PDF: The Gateway to Malicious Payloads

Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent...

McAfee Labs

GUloader Unmasked: Decrypting the Threat of Malicious SVG Files

Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep understanding...

McAfee Labs

MoqHao evolution: New variants start automatically right after installation

Authored by Dexter Shin  MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first...

McAfee Labs

Generative AI: Cross the Stream Where it is Shallowest

The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles, but in mainstream...

McAfee Labs

From Email to RAT: Deciphering a VB Script-Driven Campaign

Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...

McAfee Labs

Stealth Backdoor “Android/Xamalicious” Actively Infecting Devices

Authored by Fernando Ruiz  McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source framework that allows...

McAfee Labs

Shielding Against Android Phishing in Indian Banking

Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through mobile applications has...

McAfee Labs

PDF Phishing: Beyond the Bait

By Lakshya Mathur & Yashvi Shah  Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential...

McAfee Labs

Beneath the Surface: How Hackers Turn NetSupport Against Users

NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve...

McAfee Labs

Fake Android and iOS apps steal SMS and contacts in South Korea

Authored by Dexter Shin Most people have smartphones these days which can be used to easily search for various topics...

Subscribe to McAfee Securing Tomorrow Blogs