Other Blogs

[breadcrumb]

Featured Blogs

Life at McAfee

The Legacy Continues – What Black History Month Means to Us

By Karla, Digital Media Specialist At McAfee, we celebrate the diverse backgrounds of our global workforce year-round, but during the...

Life at McAfee

The McAfee Adventures of a Middle School Teacher

By Lori, AVID Teacher, Haggard Middle School I knew when I met you an adventure was going to happen. –...

McAfee Labs

The Morning After: What Happens to Data Post-Breach?

This post first appeared on the security website Dark Reading. We need consumers and businesses to not simply shrug off...

Life at McAfee

The New Intern-Net

By Cristina, Channel Team Intern in Plano, Texas. As a college student today, it often feels like it’s essential to...

McAfee Labs

The Newest Malicious Actor: “Squirrelwaffle” Malicious Doc.

Authored By Kiran Raj Due to their widespread use, Office Documents are commonly used by Malicious actors as a way...

McAfee Labs

The Rise and Risks of AI Art Apps

Authored by Fernando Ruiz The popularity of AI-based mobile applications that can create artistic images based on pictures, such as...

McAfee Labs

The Rise of Backdoor-FCKQ (CTB-Locker)

By Raj Samani (@Raj_Samani) and Christiaan Beek (@ChristiaanBeek) In the McAfee Labs Threats Report published in November 2014, Senior Vice...

McAfee Labs

The Rise of Deep Learning for Detection and Classification of Malware

Co-written by Catherine Huang, Ph.D. and Abhishek Karnik  Artificial Intelligence (AI) continues to evolve and has made huge progress over the last decade. AI shapes our daily lives. Deep learning is a subset of techniques in AI that...

McAfee Labs

The Rising Trend of OneNote Documents for Malware delivery

Authored By Anandeshwar Unnikrishnan,Sakshi Jaiswal,Anuradha M  McAfee Labs has recently observed a new Malware campaign which used malicious OneNote documents...

McAfee Labs

The Riskiest Web Domains Revealed – Mapping The Malweb

The world’s most heavily trafficked web domain, .COM, is now the riskiest, according to our fourth annual Mapping the Mal...

McAfee Labs

The Scam Strikes Back: Exploiting the CrowdStrike Outage

Authored by Lakshya Mathur, Vallabh Chole & Abhishek Karnik Recently we witnessed one of the most significant IT disruptions in...

McAfee Labs

The Season of Back to School Scams

Authored by: Lakshya Mathur and Yashvi Shah  As the Back-to-School season approaches, scammers are taking advantage of the opportunity to...

McAfee Labs

The Stealthy Stalker: Remcos RAT

Authored By Sakshi Jaiswal, Anuradha M In Q3 2024, McAfee Labs identified a sharp rise in the Remcos RAT threat....

McAfee Labs

The Tradeoff Between Convenience and Security – A Balance for Consumers & Manufacturers

This week McAfee Advanced Threat Research (ATR) published new findings, uncovering security flaws in two popular IoT devices: a connected...

McAfee Labs

The Twin Journey, Part 1

Summary and Introduction: The recent changes in Windows 10, aiming to add case sensitivity (CS) at directory level, have prompted...

McAfee Labs

The Twin Journey, Part 2: Evil Twins in a Case In-sensitive Land

In the first of this 3-part blog series, we covered the implications of promoting files to “Evil Twins” where they...

McAfee Labs

The Twin Journey, Part 3: I’m Not a Twin, Can’t You See my Whitespace at the End?

In this series of 3 blogs (you can find part 1 here, and part 2 here), so far we have...

McAfee Labs

Threat Actors Employ COM Technology in Shellcode to Evade Detection

COM (Component Object Model) is a technology in Microsoft Windows that enables software components to communicate with each other; it...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top