Featured Blogs
Ramnit Malware Creates FTP Network From Victims’ Computers
This blog post was written by Vikas Taneja. The Ramnit worm appeared in 2010. Within a year more than eight...
Ransomware Families Use NSIS Installers to Avoid Detection, Analysis
Malware families are constantly seeking new ways to hide their code, thwart replication, and avoid detection. A recent trend for...
Ransomware GandCrab Version 5 Partners With Crypter Service for Obfuscation
The GandCrab ransomware, which first appeared in January, has been updated rapidly during its short life, with Version 5.0.2 appearing...
Ransomware Maze
EXECUTIVE SUMMARY The Maze ransomware, previously known in the community as “ChaCha ransomware”, was discovered on May the 29th 2019...
Ransomware Takes Open-Source Path, Encrypts With GNU Privacy Guard
McAfee Labs has recently observed a new variant of ransomware that relies on the open-source program GNU Privacy Guard (GnuPG)...
Ransomware Targets Healthcare Sector
When we develop threats predictions at McAfee, I personally like to conduct some proper research and base my statements on...
Ransomware Variant XTBL Another Example of Popular Malware
We have seen a huge increase in ransomware during the past couple of years. At McAfee Labs we have recently...
Ransomware: an Insight to Financial Gain
This week, joint research on the CryptoWall Version 3 family was released by the Cyber Threat Alliance. In Lucrative Ransomware...
RDP Security Explained
RDP on the Radar Recently, McAfee released a blog related to the wormable RDP vulnerability referred to as CVE-2019-0708 or...
RDP Stands for “Really DO Patch!” – Understanding the Wormable RDP Vulnerability
During Microsoft’s May Patch Tuesday cycle, a security advisory was released for a vulnerability in the Remote Desktop Protocol (RDP)....
Red Kit an Emerging Exploit Pack
Exploit kits are toolkits that are used to build malware components such as binaries and scripts. They automate the exploitation...
Redline Stealer: A Novel Approach
Authored by Mohansundaram M and Neil Tyagi A new packed variant of the Redline Stealer trojan was observed in the...
Remote iPhone Jailbreak Using PDF Exploit Should Serve as Wake-Up Call
Like many iPhone users, I “jailbreak” my iPhone. I do this for many reasons, but mainly for console-level access and...
Remote Jackpot: Hacking ATMs
Isn’t it just everybody’s dream: to walk up to an ATM, swipe your card, get a flashy screen reading “We...
Report Highlights Enterprise Biometric Vulnerabilities, Opportunities
Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede...
Researchers Follow the Breadcrumbs: The Latest Vulnerabilities in Windows’ Network Stack
The concept of a trail of breadcrumbs in the offensive security community is nothing new; for many years, researchers on...
Responses to Cybercrime in Japan and France
This week the Sorbonne University and the French Department of Justice hosted a meeting, the World and Development Institute (IMODEV) International...
Return to Workplace: Ready to Relaunch Your Career
By: Sheetal, Application Developer & Majy, IT Support McAfee offers a new program that offers professionals who dedicated extended time...