Featured Blogs
Today’s Connected Cars Vulnerable to Hacking, Malware
The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation.
Tips for Effective Threat Hunting
This blog was co-written by Ramnath Venugopalan. In May, McAfee surveyed more than 700 IT and security professionals around the...
Timeline of Bitcoin Events Demonstrates Online Currency’s Volatility
The buzz about Bitcoin has moved from online circles to mainstream media sources. Last week’s news of the collapse of...
Three Lessons I’ve Learned Battling Cancer and Cybercriminals
By Celeste, Senior Principal Engineer With our people at the heart, we are McAfee As Chief Data Scientist, Senior Principal...
Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security
On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...
Threat Actors Use Encrypted Office Binary Format to Evade Detection
This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...
Threat Actors Taking Advantage of FTX Bankruptcy
Authored by Oliver Devane It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...
Threat Actors Employ COM Technology in Shellcode to Evade Detection
COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...