Featured Blogs
Nemty Ransomware – Learning by Doing
Executive Summary The McAfee Advanced Threat Research Team (ATR) observed a new ransomware family named ‘Nemty’ on 20 August 2019....
COVID-19 Threat Update – now includes Blood for Sale
Although the use of global events as a vehicle to drive digital crime is hardly surprising, the current outbreak of...
Transitioning to a Mass Remote Workforce – We Must Verify Before Trusting
While not a new practice, the sheer volume of people required to adhere to social distancing best practices means we...
How One McAfee Advanced Threat Researcher is Giving Back During COVID-19
There is great need all around us. During COVID-19 and this time of social distancing, many people are considering ways...
MalBus Actor Changed Market from Google Play to ONE Store
Authored by: Sang Ryol Ryu and Chanung Pak McAfee Mobile Research team has found another variant of MalBus on an...
Five Tips from McAfee’s Remote Workers
Whether you’re working from for the first time or a remote working veteran, you may be looking for some tips...
Tales From the Trenches; a Lockbit Ransomware Story
Co-authored by Marc RiveroLopez. In collaboration with Northwave As we highlighted previously across two blogs, targeted ransomware attacks have increased...
McAfee Values Its Working Mothers Globally
This Mother’s Day, and every day, McAfee recognizes all the hardworking mothers across our global workforce. We continue to make...
COVID-19 – Malware Makes Hay During a Pandemic
Special thanks to Prajwala Rao, Oliver Devane, Shannon Cole, Ankit Goel and members of Malware Research for their contribution and...
Cybercriminals Actively Exploiting RDP to Target Remote Organizations
The COVID-19 pandemic has prompted many companies to enable their employees to work remotely and, in a large number of...
ENS 10.7 Rolls Back the Curtain on Ransomware
Ransomware protection and incident response is a constant battle for IT, security engineers and analysts under normal circumstances, but with...
Making Moves to Go Green at McAfee Waterloo
By Gurjeet, Software Engineer, Canada “We should protect Mother Earth. If we don’t take care of her, she won’t take...
How To Use McAfee ATP to Protect Against Emotet, LemonDuck and PowerMiner
Introduction This blog describes how McAfee ATP (Adaptive Threat Protection) rules are used within McAfee Endpoint Security products. It will...
My Flight Path: From the Royal Air Force to McAfee
By: Gareth, Technical Support Engineer, UK Where do you see yourself in five years? This well-known question is the crux...
How I Use McAfee’s Volunteer Time Off to Help Lost Paws Find Homes
by Christine, Sales Operations, Plano Imagine sixteen paws, eight floppy ears and four wagging tails happily greeting you at the door—that’s...
Leaning into Change with the McAfee Family
With today’s current climate, many companies are building cultures and infrastructures to support working from home (WFH). Like most transitions,...
OneDrive Phishing Awareness
There are number of ways scammers use to target personal information and, currently, one example is, they are taking advantage...
RagnarLocker Ransomware Threatens to Release Confidential Information
EXECUTIVE SUMMARY The RagnarLocker ransomware first appeared in the wild at the end of December 2019 as part of a...