Featured Blogs
Solving the Mystery of the Office Zero-Day Exploit and DEP
On November 5 McAfee Labs blogged about a Microsoft Office zero-day attack that we spotted in the wild. In another...
Social Network Account Stealers Hidden in Android Gaming Hacking Tool
Authored by: Wenfeng Yu McAfee Mobile Research team recently discovered a new piece of malware that specifically steals Google, Facebook,...
SMS Phishing Campaign Spreads in China
Phishing messages and fake websites for stealing users’ credentials are a common occurrence. Recently, however, mobile banking users in China...
Smishing Campaign Steals Banking Credentials in U.S.
The McAfee Mobile Research team recently found an active smishing campaign, using SMS messages, that targets online banking users in...
SMBGhost – Analysis of CVE-2020-0796
The Vulnerability The latest vulnerability in SMBv3 is a “wormable” vulnerability given its potential ability to replicate or spread over...
Slow File Infector Spies on Victims
Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents,...
Six Hundred Million Reasons to Celebrate: No More Ransom Turns FOUR!!
Happy Birthday! Today we mark the fourth anniversary of the NoMoreRansom initiative with over 4.2 million visitors, from 188 countries,...
Should I Worry About AVGater, Which Exploits Some Security Products?
This blog was written by Brook Schoenfield. On November 10, a researcher reported the vulnerability AVGater, which affects some antimalware...
Short-URL Services May Hide Threats
Short-URL services have emerged as a crucial part of the way we use the Internet. With the increasing use of...
Shiva’s Tragic Accident Turns into a Story of Resilience
My McAfee Chronicles is a series featuring McAfee team members who have interesting and inspiring life stories to share. Meet Shiva, a...
Shielding Against Android Phishing in Indian Banking
Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through mobile applications has...
Sharing Cybersecurity Threat Intelligence Is the Only Way We Win
Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good...
Shamoon Returns to Wipe Systems in Middle East, Europe
Destructive malware has been employed by adversaries for years. Usually such attacks are carefully targeted and can be motivated by...
Shamoon Rebooted?
We have recently received notifications and samples from impacted organizations in the Middle East that have hallmarks of the Shamoon...
Shamoon Rebooted in Middle East, Part 2
Last week we provided some initial analysis on recent attacks targeting organizations in the Middle East. The attack has hallmarks...
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
Last week the McAfee Advanced Threat Research team posted an analysis of a new wave of Shamoon “wiper” malware attacks...
Sex Sells: Looking at Android Adult Adware Apps
Advertising is one of the primary methods to generate money from mobile devices. Ads can be displayed in the browser...
Seven Windows Wonders – Critical Vulnerabilities in DNS Dynamic Updates
Overview For the March 2021 Patch Tuesday, Microsoft released a set of seven DNS vulnerabilities. Five of the vulnerabilities are...