Featured Blogs
GitHub’s Dark Side: Unveiling Malware Disguised as Cracks, Hacks, and Crypto Tools
Authored by Aayush Tyagi Video game hacks, cracked software, and free crypto tools remain popular bait for malware authors. Recently,...
Generative AI: Cross the Stream Where it is Shallowest
The explosive growth of Generative AI has sparked many questions and considerations not just within tech circles, but in mainstream...
GandCrab Ransomware Puts the Pinch on Victims
Update: On August 9 we added our analysis of Versions 4.2.1 and 4.3. The GandCrab ransomware first appeared in January...
GameOver Zeus/Cryptolocker: Am I Still Infected?
It has been two weeks since the announcement by multiple global law enforcement agencies regarding the takedown of the communications...
Fuzzing ImageMagick and Digging Deeper into CVE-2020-27829
Introduction: ImageMagick is a hugely popular open source software that is used in lot of systems around the world. It...
Further Analysis of WannaCry Ransomware
McAfee Labs has closely monitored the activity around the ransomware WannaCry. Many sources have reported on this attack and its...
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee
From Workshops to Leader Panels: A Recap of Women’s History Month at McAfee March is Women’s History Month and International...
From Spam to AsyncRAT: Tracking the Surge in Non-PE Cyber Threats
Authored by Yashvi Shah and Preksha Saxena AsyncRAT, also known as “Asynchronous Remote Access Trojan,” represents a highly sophisticated malware...
From Military Kid to Product Marketing: My McAfee Journey
Employee Spotlight: Meet Jovohn! From military beginnings to mobile security champion, meet Jovohn, our passionate Product Marketer and MAHC President....
From Email to RAT: Deciphering a VB Script-Driven Campaign
Authored by Preksha Saxena and Yashvi Shah McAfee Labs has been tracking a sophisticated VBS campaign characterized by obfuscated Visual...
From Building Control to Damage Control: A Case Study in Industrial Security Ft. Delta
Management. Control. It seems that you can’t stick five people in a room together without one of them trying to...
French Magazine Suffers Web Hack, Firebombing
To celebrate the recent victory of the Tunisian Islamist party, the French satirical magazine “Charlie Hebdo” published a special issue...
Free Ransomware Available on Dark Web
The McAfee Advanced Threat Research team recently analyzed a ransomware-as-a-service threat that is available for free and without registration. This malware...
Fraudulent Adult Dating Services Turn 10 Years Old, Still Evolving
McAfee Mobile Research monitors adult one-click-fraud applications on Google Play that are targeted at Japanese users. Although the attackers appeared...
For some, accounting is more than just spreadsheets! Vernon’s McAfee Journey
Vernon has been our Manager of Technical Accounting for more than two years, but that doesn’t mean he’s busy with...
Floki Bot a Sensation With International Cybercriminals
Floki Bot, new financial malware, is popular with English-, Portuguese-, and Russian-speaking underground criminal markets, winning over cybercriminals with new...
Five Tips from McAfee’s Remote Workers
Whether you’re working from for the first time or a remote working veteran, you may be looking for some tips...
First 30 Days at McAfee: Pups at Work, VR and Pledge Wall
By Beth, HR Communication Specialist in Plano, Texas. For the last six consecutive years, The Dallas Morning News has recognized...
File-Hosting Site Turns Your File Into Adware
We recently received a sample from a customer and upon initial analysis it looked like a bundled software installer. Upon...
Fighting new Ransomware Techniques with McAfee’s Latest Innovations
In 2021 ransomware attacks have been dominant among the bigger cyber security stories. Hence, I was not surprised to see...
Fighting Mobile Phone Impersonation and Surveillance
Yesterday at the 28th Chaos Communications Congress (28C3), in Berlin, security researchers along with Karsten Nohl and Luca Melette showcased...
Farewell to the SHA-1 Hash Algorithm
Rest in peace SHA-1. Like all security controls, they are valuable only for a certain time. SHA-1, a legacy hashing...
Fallout Exploit Kit Releases the Kraken Ransomware on Its Victims
Alexandr Solad and Daniel Hatheway of Recorded Future are coauthors of this post. Read Recorded Future’s version of this analysis. ...
Fakecalls Android Malware Abuses Legitimate Signing Key
Authored by Dexter Shin McAfee Mobile Research Team found an Android banking trojan signed with a key used by legitimate...
Fake-Alert Scams Growing Again
Fake-alert Trojans, also known as scareware, fool consumers by claiming imaginary threats, and insisting its victims purchase a product to...
Fake WannaCry ‘Protectors’ Emerge on Google Play
Are Android devices affected by the self-propagating ransomware WannaCry? No—because this threat exploits a vulnerability in Microsoft Windows. This malware...
Fake Toll Road Scam Texts are Everywhere. These Cities are The Most Targeted.
Look both ways for a new form of scam that’s on the rise, especially if you live in Dallas, Atlanta,...