Other Blogs

[breadcrumb]

Featured Blogs

McAfee Labs

Threat Actors Taking Advantage of FTX Bankruptcy 

Authored by Oliver Devane  It hasn’t taken malicious actors long to take advantage of the recent bankruptcy filing of FTX,...

McAfee Labs

Threat Actors Use Encrypted Office Binary Format to Evade Detection

This blog post was written in conjunction with Xiaoning Li. Microsoft Office documents play an important role in our work...

McAfee Labs

Threat Group APT28 Slips Office Malware into Doc Citing NYC Terror Attack

This blog post was co-written by Michael Rea. During our monitoring of activities around the APT28 threat group, McAfee Advanced...

McAfee Labs

Threat Report: Don’t Join Blockchain Revolution Without Ensuring Security

On May 19 researchers discovered a series of vulnerabilities in the blockchain-based EOS platform that can lead to remote control...

Life at McAfee

Three Lessons I’ve Learned Battling Cancer and Cybercriminals

By Celeste, Senior Principal Engineer With our people at the heart, we are McAfee As Chief Data Scientist, Senior Principal...

McAfee Labs

Timeline of Bitcoin Events Demonstrates Online Currency’s Volatility

The buzz about Bitcoin has moved from online circles to mainstream media sources. Last week’s news of the collapse of...

McAfee Labs

Tips for Effective Threat Hunting

This blog was co-written by Ramnath Venugopalan. In May, McAfee surveyed more than 700 IT and security professionals around the...

McAfee Labs

Today’s Connected Cars Vulnerable to Hacking, Malware

The McAfee Advanced Threat Research team recently published an article about threats to automobiles on the French site JournalAuto.com. Connected cars are growing rapidly in number and represent the next big step in personal transportation.

McAfee Labs

Top 3 Phishing Attacks Use Similar Tricks

Phishing scams are immensely popular and we see millions of phishing messages everyday. Today we offer the top three phishing...

McAfee Labs

Top 5 Things to Know About Recent IoT Attacks

While the IoT offers tremendous benefits, such as allowing users to monitor their homes or check the contents of their refrigerators remotely, it also presents a significant risk. For hackers, each IoT device represents a potential recruit for their bot armies.

McAfee Labs

Top Tips for Securing Home Cameras

Installing a home surveillance camera system can add great benefits but also may introduce new risks to privacy and network...

McAfee Labs

Top Tips to Spot Tech Support Scams

There are number of ways scammers use to target your money or personal details.  These scams include support sites for...

McAfee Labs

Tracking PDF Usage Poses a Security Problem

Update on May 2 Adobe has confirmed this vulnerability and has scheduled a patch release for May 14.   Looking...

McAfee Labs

Trailing the Trojan njRAT

One Trojan that just won’t go away is the remote access tool njRAT. Microsoft recently took down a leading domain...

McAfee Labs

Transitioning to a Mass Remote Workforce – We Must Verify Before Trusting

While not a new practice, the sheer volume of people required to adhere to social distancing best practices means we...

McAfee Labs

Travnet Botnet Controls Victims With Remote Admin Tool

The malicious binary behind the Travnet botnet has been updated. The new code has a new compression algorithm, steals the...

McAfee Labs

Travnet Botnet Steals Huge Amount of Sensitive Data

In a McAfee Labs blog by my colleague Vikas Taneja last month, he discussed high-level functioning in the malware Travnet....

McAfee Labs

Travnet Trojan Could Be Part of APT Campaign

This blog post was written by Vikas Taneja. Attackers use all kinds of attack vectors to steal sensitive information from...

Subscribe to McAfee Securing Tomorrow Blogs

Back to top