Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Tales From the Trenches; a Lockbit Ransomware Story

Co-authored by Marc RiveroLopez. In collaboration with Northwave As we highlighted previously across two blogs, targeted ransomware attacks have increased...

McAfee Labs

Talking About Cyber Risks Educates the Community

In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light. Sophisticated attacks against...

McAfee Labs

Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities

Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often...

McAfee Labs

Targeted Attacks, Stolen Certificates, and the Shiqiang Gang

This blog post was written by Rahul Mohandas. The trend of attackers using stolen digital certificates to disguise their malicious...

McAfee Labs

Targeted Ransomware No Longer a Future Threat

This post was written by Christiaan Beek and Andrew Furtak. In 2015, McAfee investigated a ransomware campaign that targeted the...

McAfee Labs

Technical Support Scams – What to look out for

Authored by Oliver Devane Technical Support Scams have been targeting computer users for many years. Their goal is to make...

McAfee Labs

Teslacrypt Joins Ransomware Field

A newly crafted ransomware, Teslacrypt, has arrived in the malware genre that encrypts user files using AES encryption and demands...

McAfee Labs

TeslaCrypt Ransomware Arrives via Neutrino Exploit Kit

This post was written by Sriram P. and Varadharajan Krishnasamy. TeslaCrypt is a ransomware family that encrypts files and extorts money...

Life at McAfee

The 2019 Job Seeker & The Cybersecurity Skills Shortage

In today’s ever-changing job market, job seekers and employers alike are under a great deal of pressure. Those looking for...

McAfee Labs

The Cloning of The Ring – Who Can Unlock Your Door?

Steve Povolny contributed to this report. McAfee’s Advanced Threat Research team performs security analysis of products and technologies across nearly...

Internet Security McAfee Labs

The Dark Side of Clickbait: How Fake Video Links Deliver Malware

Authored By Sakshi Jaiswal  McAfee Labs recently observed a surge in phishing campaigns that use fake viral video links to trick users...

McAfee Labs

The Dark Side of Gen AI

There’s no denying that Generative Artificial Intelligence (GenAI) has been one of the most significant technological developments in recent memory,...

McAfee Labs

The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen

Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with...

McAfee Labs

The Day of the Golden Jackal – The Next Tale in the Stuxnet Files: Duqu Updated

Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the...

McAfee Labs

The Future of Hacktivism and Anonymous

After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of...

McAfee Labs

The Hidden Costs of Cyber Attacks

The real costs of cyber attacks are difficult to understand. The impacts of cybersecurity are terribly challenging to measure, which...

Life at McAfee

The Kids are in Charge

By Ribu, Communications Manager  Kids are wonderful, aren’t they? And what could be better than having a record-breaking 500 children...

McAfee Labs

The Latest IoT Device I Do Not Want Hacked

What if someone hacked this remotely controlled semiautonomous tractor? I am a cybersecurity guy and a huge fan of technology....

Life at McAfee

The Legacy Continues – What Black History Month Means to Us

By Karla, Digital Media Specialist At McAfee, we celebrate the diverse backgrounds of our global workforce year-round, but during the...

Life at McAfee

The McAfee Adventures of a Middle School Teacher

By Lori, AVID Teacher, Haggard Middle School I knew when I met you an adventure was going to happen. –...

McAfee Labs

The Morning After: What Happens to Data Post-Breach?

This post first appeared on the security website Dark Reading. We need consumers and businesses to not simply shrug off...

Life at McAfee

The New Intern-Net

By Cristina, Channel Team Intern in Plano, Texas. As a college student today, it often feels like it’s essential to...

McAfee Labs

The Newest Malicious Actor: “Squirrelwaffle” Malicious Doc.

Authored By Kiran Raj Due to their widespread use, Office Documents are commonly used by Malicious actors as a way...

McAfee Labs

The Rise and Risks of AI Art Apps

Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as...

McAfee Labs

The Rise of Backdoor-FCKQ (CTB-Locker)

By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice...

McAfee Labs

The Rise of Deep Learning for Detection and Classification of Malware

Co-written by Catherine Huang, Ph.D. and Abhishek Karnik  Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that...

McAfee Labs

The Rising Trend of OneNote Documents for Malware delivery

Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M  McAfee Labs has recently observed a new Malware campaign which used malicious OneNote documents...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top