Featured Blogs
Did You Check Your Quarantine?!
A cost-effective way to detect targeted attacks in your enterprise While it is easy to get caught up in the...
Buran Ransomware; the Evolution of VegaLocker
McAfee’s Advanced Threat Research Team observed how a new ransomware family named ‘Buran’ appeared in May 2019. Buran works as...
Spanish MSSP Targeted by BitPaymer Ransomware
Co-authored by Marc RiveroLopez Initial Discovery This week the news hit that several companies in Spain were hit by a...
Top Tips to Spot Tech Support Scams
There are number of ways scammers use to target your money or personal details. These scams include support sites for...
Analysis of LooCipher, a New Ransomware Family Observed This Year
Co-authored by Marc RiveroLopez. Initial Discovery This year seems to again be the year for ransomware. Notorious attacks were made...
The Tradeoff Between Convenience and Security – A Balance for Consumers & Manufacturers
This week McAfee Advanced Threat Research (ATR) published new findings, uncovering security flaws in two popular IoT devices: a connected...
The Cloning of The Ring – Who Can Unlock Your Door?
Steve Povolny contributed to this report. McAfee’s Advanced Threat Research team performs security analysis of products and technologies across nearly...
We Be Jammin’ – Bypassing Chamberlain myQ Garage Doors
The convenience that many IOT devices provide often persuades consumers away from thinking about possible security concerns. McAfee Advanced Threat Research recently investigated Chamberlain’s MyQ Hub, a “Universal” garage door automation platform.
Iran Cyber Threat Update
Recent political tensions in the Middle East region have led to significant speculation of increased cyber-related activities. McAfee is on...
CurveBall – An Unimaginative Pun but a Devastating Bug
Enterprise customers looking for information on defending against Curveball can find information here. 2020 came in with a bang this...
An Inside Look into Microsoft Rich Text Format and OLE Exploits
There has been a dramatic shift in the platforms targeted by attackers over the past few years. Up until 2016,...
U.S. Battleground County Website Security Survey
Today McAfee released the results of a survey of county websites and county election administration websites in the 13 states...
Intelligence in the Enterprise
Intelligence became an integral military discipline centuries ago. More recently, this practice evolved into what is called Intelligence Preparation of the Battlefield,...
Knock, Knock – Who’s There?
A Windows Linux Subsystem Interop Analysis Following our research from Evil Twins and Windows Linux Subsystem, interoperability between different WSL...
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II
In our first article we discussed the growing pattern of targeted ransomware attacks where the first infection stage is often...
Model Hacking ADAS to Pave Safer Roads for Autonomous Vehicles
The last several years have been fascinating for those of us who have been eagerly observing the steady move towards...
Introduction and Application of Model Hacking
Catherine Huang, Ph.D., and Shivangee Trivedi contributed to this blog. The term “Adversarial Machine Learning” (AML) is a mouthful! The...
Multi-tricks HiddenAds Malware
Thousands of HiddenAds Trojan Apps Masquerade as Google Play Apps The McAfee mobile research team has recently discovered a new...