Featured Blogs
Scammers Impersonating Windows Defender to Push Malicious Windows Apps
Summary points: Scammers are increasingly using Windows Push Notifications to impersonate legitimate alerts Recent campaigns pose as a Windows Defender...
Securing Space 4.0 – One Small Step or a Giant Leap? Part 1
McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and...
Securing Space 4.0 – One Small Step or a Giant Leap? Part 2
McAfee Advanced Threat Research (ATR) is collaborating with Cork Institute of Technology (CIT) and its Blackrock Castle Observatory (BCO) and...
Security on Silicon the Next Big Step in Cyber Protection
With the growth of the Internet of Things, going from 15 billion to 200 billion devices by 2020, and the...
Seeing Through Darkleech Obfuscation: a Quick Hack to Iframes
This blog post was written by Kalpesh Mantri. Darkleech is an Apache module on the dark web that distributes malware....
Self-Signed Certificates Can Be Secure, So Why Ban Them?
This blog was co-written by Brook Schoenfield and Ramnath Venugopalan. In many organizations the use of self-signed certificates is forbidden...
Server-Side Request Forgery Takes Advantage of Vulnerable App Servers
This blog was written by Kunal Garg. Server-side request forgery is an attack in which an attacker can force a...
Setting Up HTTPS for Google App Engine Applications
Thursday, we posted advice on creating a custom domain name for an application developed with Google’s App Engine. In this...
Seven Windows Wonders – Critical Vulnerabilities in DNS Dynamic Updates
Overview For the March 2021 Patch Tuesday, Microsoft released a set of seven DNS vulnerabilities. Five of the vulnerabilities are...
Sex Sells: Looking at Android Adult Adware Apps
Advertising is one of the primary methods to generate money from mobile devices. Ads can be displayed in the browser...
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
Last week the McAfee Advanced Threat Research team posted an analysis of a new wave of Shamoon “wiper” malware attacks...
Shamoon Rebooted in Middle East, Part 2
Last week we provided some initial analysis on recent attacks targeting organizations in the Middle East. The attack has hallmarks...
Shamoon Rebooted?
We have recently received notifications and samples from impacted organizations in the Middle East that have hallmarks of the Shamoon...
Shamoon Returns to Wipe Systems in Middle East, Europe
Destructive malware has been employed by adversaries for years. Usually such attacks are carefully targeted and can be motivated by...
Sharing Cybersecurity Threat Intelligence Is the Only Way We Win
Cybersecurity is a team sport. The bad guys share information, expertise, and code as they help one another. The good...
Shielding Against Android Phishing in Indian Banking
Authored by Neil Tyagi and Fernando Ruiz In a digitally evolving world, the convenience of banking through mobile applications has...
Shiva’s Tragic Accident Turns into a Story of Resilience
My McAfee Chronicles is a series featuring McAfee team members who have interesting and inspiring life stories to share. Meet Shiva, a...
Short-URL Services May Hide Threats
Short-URL services have emerged as a crucial part of the way we use the Internet. With the increasing use of...
Should I Worry About AVGater, Which Exploits Some Security Products?
This blog was written by Brook Schoenfield. On November 10, a researcher reported the vulnerability AVGater, which affects some antimalware...
Six Hundred Million Reasons to Celebrate: No More Ransom Turns FOUR!!
Happy Birthday! Today we mark the fourth anniversary of the NoMoreRansom initiative with over 4.2 million visitors, from 188 countries,...
Slow File Infector Spies on Victims
Sourabh Kadam contributed to this blog. In the middle of 2012 McAfee Labs observed the complex malware XDocCrypt infecting documents,...
SMBGhost – Analysis of CVE-2020-0796
The Vulnerability The latest vulnerability in SMBv3 is a “wormable” vulnerability given its potential ability to replicate or spread over...
Smishing Campaign Steals Banking Credentials in U.S.
The McAfee Mobile Research team recently found an active smishing campaign, using SMS messages, that targets online banking users in...
SMS Phishing Campaign Spreads in China
Phishing messages and fake websites for stealing users’ credentials are a common occurrence. Recently, however, mobile banking users in China...
Social Network Account Stealers Hidden in Android Gaming Hacking Tool
Authored by: Wenfeng Yu McAfee Mobile Research team recently discovered a new piece of malware that specifically steals Google, Facebook,...
Solving the Mystery of the Office Zero-Day Exploit and DEP
On November 5 McAfee Labs blogged about a Microsoft Office zero-day attack that we spotted in the wild. In another...
Spanish MSSP Targeted by BitPaymer Ransomware
Co-authored by Marc RiveroLopez Initial Discovery This week the news hit that several companies in Spain were hit by a...