Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

The Riskiest Web Domains Revealed – Mapping The Malweb

The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...

McAfee Labs

The Scam Strikes Back: Exploiting the CrowdStrike Outage

Authored by Lakshya Mathur, Vallabh Chole & Abhishek Karnik Recently we witnessed one of the most significant IT disruptions in...

McAfee Labs

The Season of Back to School Scams

Authored by: Lakshya Mathur and Yashvi Shah  As the Back-to-School season approaches, scammers are taking advantage of the opportunity to...

McAfee Labs

The Stealthy Stalker: Remcos RAT

Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat....

McAfee Labs

The Tradeoff Between Convenience and Security – A Balance for Consumers & Manufacturers

This week McAfee Advanced Threat Research (ATR) published new findings, uncovering security flaws in two popular IoT devices: a connected...

McAfee Labs

The Twin Journey, Part 1

Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...

McAfee Labs

The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land

In the first of this 3-part blog series, we covered the implications of promoting files to “Evil Twins” where they...

McAfee Labs

The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?

In this series of 3 blogs (you can find part 1 here, and part 2 here), so far we have...

McAfee Labs

Threat Actors Employ COM Technology in Shellcode to Evade Detection

COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...

McAfee Labs

Threat Actors Taking Advantage of FTX Bankruptcy 

Authored by Oliver Devane  It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...

McAfee Labs

Threat Actors Use Encrypted Office Binary Format to Evade Detection

This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...

McAfee Labs

Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack

This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...

McAfee Labs

Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security

On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...

Life at McAfee

Three Lessons I’ve Learned Battling Cancer and Cybercriminals

By Celeste, Senior Principal Engineer With our people at the heart, we are McAfee As Chief Data Scientist, Senior Principal...

McAfee Labs

Timeline of Bitcoin Events Demonstrates Online Currency’s Volatility

The buzz about Bitcoin has moved from online circles to mainstream media sources. Last week’s news of the collapse of...

McAfee Labs

Tips for Effective Threat Hunting

This blog was co-written by Ramnath Venugopalan. In May, McAfee surveyed more than 700 IT and security professionals around the...

McAfee Labs

Today’s Connected Cars Vulnerable to Hacking, Malware

The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation.

McAfee Labs

Top 3 Phishing Attacks Use Similar Tricks

Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing...

McAfee Labs

Top 5 Things to Know About Recent IoT Attacks

While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the contents of their refrigerators remotely, it also presents a significant risk. For hackers, each IoT device represents a potential recruit for their bot armies.

McAfee Labs

Top Tips for Securing Home Cameras

Installing a home surveillance camera system can add great benefits but also may introduce new risks to privacy and network...

McAfee Labs

Top Tips to Spot Tech Support Scams

There are number of ways scammers use to target your money or personal details.  These scams include support sites for...

McAfee Labs

Tracking PDF Usage Poses a Security Problem

Update on May 2 Adobe has confirmed this vulnerability and has scheduled a patch release for May 14.   Looking...

McAfee Labs

Trailing the Trojan njRAT

One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain...

McAfee Labs

Transitioning to a Mass Remote Workforce – We Must Verify Before Trusting

While not a new practice, the sheer volume of people required to adhere to social distancing best practices means we...

McAfee Labs

Travnet Botnet Controls Victims With Remote Admin Tool

The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the...

McAfee Labs

Travnet Botnet Steals Huge Amount of Sensitive Data

In a McAfee Labs blog by my colleague Vikas Taneja last month, he discussed high-level functioning in the malware Travnet....

McAfee Labs

Travnet Trojan Could Be Part of APT Campaign

This blog post was written by Vikas Taneja. Attackers use all kinds of attack vectors to steal sensitive information from...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top