Featured Blogs
Tales From the Trenches; a Lockbit Ransomware Story
Co-authored by Marc RiveroLopez. In collaboration with Northwave As we highlighted previously across two blogs, targeted ransomware attacks have increased...
Talking About Cyber Risks Educates the Community
In the last 12 months, we have seen an unprecedented number of cyberattacks occur or come to light. Sophisticated attacks against...
Targeted Attacks on French Company Exploit Multiple Word Vulnerabilities
Spear phishing email is a major worry to any organization. Messages that appear legitimate and specific fool us more often...
Targeted Attacks, Stolen Certificates, and the Shiqiang Gang
This blog post was written by Rahul Mohandas. The trend of attackers using stolen digital certificates to disguise their malicious...
Targeted Ransomware No Longer a Future Threat
This post was written by Christiaan Beek and Andrew Furtak. In 2015, McAfee investigated a ransomware campaign that targeted the...
Technical Support Scams – What to look out for
Authored by Oliver Devane Technical Support Scams have been targeting computer users for many years. Their goal is to make...
Teslacrypt Joins Ransomware Field
A newly crafted ransomware, Teslacrypt, has arrived in the malware genre that encrypts user files using AES encryption and demands...
TeslaCrypt Ransomware Arrives via Neutrino Exploit Kit
This post was written by Sriram P. and Varadharajan Krishnasamy. TeslaCrypt is a ransomware family that encrypts files and extorts money...
The 2019 Job Seeker & The Cybersecurity Skills Shortage
In today’s ever-changing job market, job seekers and employers alike are under a great deal of pressure. Those looking for...
The Cloning of The Ring – Who Can Unlock Your Door?
Steve Povolny contributed to this report. McAfee’s Advanced Threat Research team performs security analysis of products and technologies across nearly...
The Dark Side of Clickbait: How Fake Video Links Deliver Malware
Authored By Sakshi Jaiswal McAfee Labs recently observed a surge in phishing campaigns that use fake viral video links to trick users...
The Dark Side of Gen AI
There’s no denying that Generative Artificial Intelligence (GenAI) has been one of the most significant technological developments in recent memory,...
The Darkgate Menace: Leveraging Autohotkey & Attempt to Evade Smartscreen
Authored by Yashvi Shah, Lakshya Mathur and Preksha Saxena McAfee Labs has recently uncovered a novel infection chain associated with...
The Day of the Golden Jackal – The Next Tale in the Stuxnet Files: Duqu Updated
Stuxnet was possibly the most complex attack of this decade, and we expected that similar attacks would appear in the...
The Future of Hacktivism and Anonymous
After the publication of the 2013 Threats Predictions from McAfee Labs, I have received many queries regarding our expectation of...
The Hidden Costs of Cyber Attacks
The real costs of cyber attacks are difficult to understand. The impacts of cybersecurity are terribly challenging to measure, which...
The Kids are in Charge
By Ribu, Communications Manager Kids are wonderful, aren’t they? And what could be better than having a record-breaking 500 children...
The Latest IoT Device I Do Not Want Hacked
What if someone hacked this remotely controlled semiautonomous tractor? I am a cybersecurity guy and a huge fan of technology....