Featured Blogs
The Riskiest Web Domains Revealed – Mapping The Malweb
The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...
The Scam Strikes Back: Exploiting the CrowdStrike Outage
Authored by Lakshya Mathur, Vallabh Chole & Abhishek Karnik Recently we witnessed one of the most significant IT disruptions in...
The Season of Back to School Scams
Authored by: Lakshya Mathur and Yashvi Shah As the Back-to-School season approaches, scammers are taking advantage of the opportunity to...
The Stealthy Stalker: Remcos RAT
Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat....
The Tradeoff Between Convenience and Security – A Balance for Consumers & Manufacturers
This week McAfee Advanced Threat Research (ATR) published new findings, uncovering security flaws in two popular IoT devices: a connected...
The Twin Journey, Part 1
Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...
The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land
In the first of this 3-part blog series, we covered the implications of promoting files to “Evil Twins” where they...
The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?
In this series of 3 blogs (you can find part 1 here, and part 2 here), so far we have...
Threat Actors Employ COM Technology in Shellcode to Evade Detection
COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...
Threat Actors Taking Advantage of FTX Bankruptcy
Authored by Oliver Devane It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...
Threat Actors Use Encrypted Office Binary Format to Evade Detection
This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...
Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack
This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...
Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security
On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...
Three Lessons I’ve Learned Battling Cancer and Cybercriminals
By Celeste, Senior Principal Engineer With our people at the heart, we are McAfee As Chief Data Scientist, Senior Principal...
Timeline of Bitcoin Events Demonstrates Online Currency’s Volatility
The buzz about Bitcoin has moved from online circles to mainstream media sources. Last week’s news of the collapse of...
Tips for Effective Threat Hunting
This blog was co-written by Ramnath Venugopalan. In May, McAfee surveyed more than 700 IT and security professionals around the...
Today’s Connected Cars Vulnerable to Hacking, Malware
The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation.
Top 3 Phishing Attacks Use Similar Tricks
Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing...
Top 5 Things to Know About Recent IoT Attacks
While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the contents of their refrigerators remotely, it also presents a significant risk. For hackers, each IoT device represents a potential recruit for their bot armies.
Top Tips for Securing Home Cameras
Installing a home surveillance camera system can add great benefits but also may introduce new risks to privacy and network...
Top Tips to Spot Tech Support Scams
There are number of ways scammers use to target your money or personal details. These scams include support sites for...
Tracking PDF Usage Poses a Security Problem
Update on May 2 Adobe has confirmed this vulnerability and has scheduled a patch release for May 14. Looking...
Trailing the Trojan njRAT
One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain...
Transitioning to a Mass Remote Workforce – We Must Verify Before Trusting
While not a new practice, the sheer volume of people required to adhere to social distancing best practices means we...
Travnet Botnet Controls Victims With Remote Admin Tool
The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the...
Travnet Botnet Steals Huge Amount of Sensitive Data
In a McAfee Labs blog by my colleague Vikas Taneja last month, he discussed high-level functioning in the malware Travnet....
Travnet Trojan Could Be Part of APT Campaign
This blog post was written by Vikas Taneja. Attackers use all kinds of attack vectors to steal sensitive information from...