Other Blogs

[breadcrumb]

Featured Blogs

Mobile Security McAfee Labs

Fake Bahrain Government Android App Steals Personal Data Used for Financial Fraud

Authored by Dexter Shin Many government agencies provide their services online for the convenience of their citizens. Also, if this...

McAfee Labs

How Scammers Hijack Your Instagram

Authored by Vignesh Dhatchanamoorthy, Rachana S Instagram, with its vast user base and dynamic platform, has become a hotbed for...

McAfee Labs

From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats

Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as “Asynchronous Remote Access Trojan,” represents a highly sophisticated malware...

McAfee Labs

The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen

Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with...

McAfee Labs

Redline Stealer: A Novel Approach

Authored by Mohansundaram M and Neil Tyagi A new packed variant of the Redline Stealer trojan was observed in the...

McAfee Labs

Distinctive Campaign Evolution of Pikabot Malware

Authored by Anuradha and Preksha Introduction PikaBot is a malicious backdoor that has been active since early 2023. Its modular...

McAfee Labs

Android Phishing Scam Using Malware-as-a-Service on the Rise in India

Authored by ZePeng Chen and Wenfeng Yu  McAfee Mobile Research Team has observed an active scam malware campaign targeting Android...

Life at McAfee

How we’re #InspiringInclusion at McAfee for International Women’s Day 2024

International Women’s Day 2024’s theme, #InspireInclusion, reminds us that genuine change requires going beyond individual actions. It’s about fostering an...

McAfee Labs

Rise in Deceptive PDF: The Gateway to Malicious Payloads

Authored by Yashvi Shah and Preksha Saxena McAfee Labs has recently observed a significant surge in the distribution of prominent...

McAfee Labs

GUloader Unmasked: Decrypting the Threat of Malicious SVG Files

Authored by: Vignesh Dhatchanamoorthy In the ever-evolving landscape of cybersecurity threats, staying ahead of malicious actors requires a deep understanding...

Life at McAfee

From Military Kid to Product Marketing: My McAfee Journey

Employee Spotlight: Meet Jovohn! From military beginnings to mobile security champion, meet Jovohn, our passionate Product Marketer and MAHC President....

Life at McAfee

Celebrating International Day of Women and Girls in Science

Advice and Insights from some of McAfee’s brightest STEM leaders This International Day of Women and Girls in Science, #TeamMcAfee...

McAfee Labs

MoqHao evolution: New variants start automatically right after installation

Authored by Dexter Shin  MoqHao is a well-known Android malware family associated with the Roaming Mantis threat actor group first...

McAfee Labs

Generative AI: Cross the Stream Where it is Shallowest

The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles, but in mainstream...

McAfee Labs

From Email to RAT: Deciphering a VB Script-Driven Campaign

Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...

Life at McAfee

Honoring Martin Luther King Jr.’s Legacy with McAfee’s African Heritage Community

Today, we celebrate the life and legacy of Dr. Martin Luther King Jr. Dr. King diligently dedicated his life to...

Mobile Security McAfee Labs

Stealth Backdoor “Android/Xamalicious” Actively Infecting Devices

Authored by Fernando Ruiz  McAfee Mobile Research Team identified an Android backdoor implemented with Xamarin, an open-source framework that allows...

McAfee Labs

Shielding Against Android Phishing in Indian Banking

Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through mobile applications has...

McAfee Labs

PDF Phishing: Beyond the Bait

By Lakshya Mathur & Yashvi Shah  Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential...

McAfee Labs

Beneath the Surface: How Hackers Turn NetSupport Against Users

NetSupport malware variants have been a persistent threat, demonstrating adaptability and evolving infection techniques. In this technical analysis, we delve...

Mobile Security McAfee Labs

Fake Android and iOS apps steal SMS and contacts in South Korea

Authored by Dexter Shin Most people have smartphones these days which can be used to easily search for various topics...

McAfee Labs

Unmasking AsyncRAT New Infection Chain

Authored by Lakshya Mathur & Vignesh Dhatchanamoorthy AsyncRAT, short for “Asynchronous Remote Access Trojan,” is a sophisticated piece of malware...

McAfee Labs

Exploring Winrar Vulnerability (CVE-2023-38831)

Authored by Neil Tyagi On 23 August 2023, NIST disclosed a critical RCE vulnerability CVE-2023-38831. It is related to an...

McAfee Labs

Agent Tesla’s Unique Approach: VBS and Steganography for Delivery and Intrusion

Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the...

McAfee Labs

Peeling Back the Layers of RemcosRat Malware

Authored by Preksha Saxena McAfee labs observed a Remcos RAT campaign where malicious VBS files were delivered via phishing email....

McAfee Labs

Crypto Scam: SpaceX Tokens for Sale

Authored by: Neil Tyagi   Scam artists know no bounds—and that also applies to stealing your cryptocurrency. Crypto scams are like...

McAfee Labs

Invisible Adware: Unveiling Ad Fraud Targeting Android Users

Authored by SangRyol Ryu, McAfee Threat Researcher We live in a world where advertisements are everywhere, and it’s no surprise...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top